[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bouke et al., 2024 - Google Patents

An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approach

Bouke et al., 2024

View HTML
Document ID
6159942329706758990
Author
Bouke M
Abdullah A
Publication year
Publication venue
e-Prime-Advances in Electrical Engineering, Electronics and Energy

External Links

Snippet

This paper thoroughly compares thirteen unique Machine Learning (ML) models utilized for Intrusion detection systems (IDS) in a meticulously controlled environment. Unlike previous studies, we introduce a novel approach that meticulously avoids data leakage, enhancing …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/6292Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features

Similar Documents

Publication Publication Date Title
Disha et al. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique
Geetha et al. A review on the effectiveness of machine learning and deep learning algorithms for cyber security
Charmet et al. Explainable artificial intelligence for cybersecurity: a literature survey
Naik et al. The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review
Chapaneri et al. A comprehensive survey of machine learning-based network intrusion detection
Chakir et al. An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
Kheddar et al. Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Imran et al. A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Abirami et al. Building an ensemble learning based algorithm for improving intrusion detection system
Sethi et al. Robust adaptive cloud intrusion detection system using advanced deep reinforcement learning
Srinivas et al. A novel machine learning inspired algorithm to predict real-time network intrusions
Kuppa et al. Learn to adapt: Robust drift detection in security domain
Mishra Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy
Khan et al. Performance evaluation of advanced machine learning algorithms for network intrusion detection system
Bouke et al. An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approach
El-Sofany et al. Using machine learning algorithms to enhance IoT system security
Al Nuaimi et al. A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset
Hossain et al. Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity
Mahmood et al. Optimizing Network Security with Machine Learning and Multi-Factor Authentication for Enhanced Intrusion Detection
Alshaeaa et al. Developing a hybrid feature selection method to detect botnet attacks in IoT devices
Prabhakaran et al. mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
Meganathan et al. Security establishment using deep convolutional network model in cyber-physical systems
Yang et al. Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Al Hwaitat et al. Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning.
Kumari et al. Leveraging blockchain and machine learning to counter DDoS attacks over IoT network