CINXE.COM

A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>A Survey in Techniques for Imbalanced Intrusion Detection System Datasets</title> <meta name="description" content="A Survey in Techniques for Imbalanced Intrusion Detection System Datasets"> <meta name="keywords" content="IDS, intrusion detection system, imbalanced datasets, sampling algorithms, big data."> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <meta name="citation_title" content="A Survey in Techniques for Imbalanced Intrusion Detection System Datasets"> <meta name="citation_author" content="Najmeh Abedzadeh"> <meta name="citation_author" content="Matthew Jacobs"> <meta name="citation_publication_date" content="2023/01/04"> <meta name="citation_journal_title" content="International Journal of Computer and Systems Engineering"> <meta name="citation_volume" content="17"> <meta name="citation_issue" content="1"> <meta name="citation_firstpage" content="9"> <meta name="citation_lastpage" content="18"> <meta name="citation_pdf_url" content="https://publications.waset.org/10012884/pdf"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value=""> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 33093</div> </div> </div> </div> <div class="card publication-listing mt-3 mb-3"> <h5 class="card-header" style="font-size:.9rem">A Survey in Techniques for Imbalanced Intrusion Detection System Datasets</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Najmeh%20Abedzadeh">Najmeh Abedzadeh</a>, <a href="https://publications.waset.org/search?q=Matthew%20Jacobs"> Matthew Jacobs</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.</p> <iframe src="https://publications.waset.org/10012884.pdf" style="width:100%; height:400px;" frameborder="0"></iframe> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=IDS" title="IDS">IDS</a>, <a href="https://publications.waset.org/search?q=intrusion%20detection%20system" title=" intrusion detection system"> intrusion detection system</a>, <a href="https://publications.waset.org/search?q=imbalanced%20datasets" title=" imbalanced datasets"> imbalanced datasets</a>, <a href="https://publications.waset.org/search?q=sampling%20algorithms" title=" sampling algorithms"> sampling algorithms</a>, <a href="https://publications.waset.org/search?q=big%20data." title=" big data."> big data.</a> </p> <a href="https://publications.waset.org/10012884/a-survey-in-techniques-for-imbalanced-intrusion-detection-system-datasets" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10012884/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10012884/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10012884/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10012884/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10012884/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10012884/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10012884/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10012884/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10012884/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10012884/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10012884.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1125</span> </span> <p class="card-text"><strong>References:</strong></p> <br>[1] Vaibhav Jayaswal, "Dealing with Imbalanced dataset”, https://towardsdatascience.com/dealing-with-imbalanced-dataset-642a5f6ee297, Oct 18, 202 <br>[2] K. Scarfone, “Guide to intrusion detection and prevention systems (idps),” Comput. Secur. Res. Center, 2012. <br>[3] L. Dali et al., "A survey of intrusion detection system," 2015 2nd World Symposium on Web Applications and Networking (WSWAN), 2015, pp. 1-6, doi: 10.1109/WSWAN.2015.7210351. <br>[4] S. Seeber and G.D. Rodosek, "Towards an adaptive and effective IDS using OpenFlow", IFIP International Conference on Autonomous Infrastructure Management and Security, pp. 134-139, 2015, June. <br>[5] A.K. Sharma, S.K. Saroj and P. Kumar, "Distributed intrusion detection system for wireless sensor networks", IOSR Journal of Computer Engineering, vol. 14, no. 4, pp. 61-70, 2013. <br>[6] Zachary Hill, John Hale, Mauricio Papa, and Peter J. Hawrylak, “Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor” 2019 2nd International Conference on Data Intelligence and Security (ICDIS), 2019 <br>[7] C. Huang, Y. Wu, Y. Zuo, K. Pei, and G. Min, “Towards experienced anomaly detector through reinforcement learning,” in Proc. Thirty-Second AAAI Conf. Artif. Intell. (AAAI-18), (Hilton New Orleans Riverside, USA), 2018. <br>[8] Pratik Satam, Hamid Alipour, Youssif Al-Nashif, and Salim Hariri, “DNS-IDS: Securing DNS in the Cloud Era” 2015 International Conference on Cloud and Autonomic Computing 2015. <br>[9] Samson Ho, Saleh Al Jufout, Khalil Dajani, and Mohammad Mozumdar, “A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Convolutional Neural Network “. IEEE Open Journal of the Computer Society, 2021. <br>[10] Ahmim, Ahmed, et al. "A novel hierarchical intrusion detection system based on decision tree and rules-based models," In Proceedings of IEEE 15th International Conference on Distributed Computing in Sensor Systems, pp. 228-233, 2019. <br>[11] M. D. Gregorio and M. Giordano, “An experimental evaluation of weightless neural networks for multi-class classification,” Applied Soft Computing, vol. 72, pp. 338–354, 2018. <br>[12] M. N. Adnan and M. Z. Islam, “Forest PA: Constructing a decision forest by penalizing attributes used in previous trees,” Expert Systems with Applications, vol. 89, pp. 389–403, 2017. <br>[13] C.-C. Chang and C.-J. Lin, “LIBSVM: A library for support vector machines,” ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, pp. 1–27, 2011. <br>[14] Zhang Xueqin, Chen Jiahao, Zhou Yue, Han, Liangxiu, Lin Jiajun, “A Multiple-layer Representation Learning Model for Network-Based Attack Detection,” IEEE Access, pp. 1-1. 2019. <br>[15] Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli, “Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection “. 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2020. <br>[16] Zoppi, T., Ceccarelli, A., & Bondavalli, A. (2019, October). “Evaluation of Anomaly Detection algorithms made easy with RELOAD” In Proceedings of the 30th Int. Symposium on Software Reliability Engineering (ISSRE), pp 446-455, IEEE <br>[17] Tahir Mehmood and Helmi B Md Rais, “Machine Learning Algorithms In Context Of Intrusion Detection” 2016 3rd International Conference On Computer And Information Sciences (ICCOINS), 2016. <br>[18] D. A. Cieslak, N. V. Chawla, and A. Striegel, ‘‘Combating imbalance in network intrusion datasets,’’ in Proc. IEEE Int. Conf. Granular Comput., May 2006, pp. 732–737. <br>[19] M. Zamani and M. Movahedi, ‘‘Machine learning techniques for intrusion detection,’’ 2013, arXiv:1312.2177. (Online). Available: http://arxiv. org/abs/1312.2177 <br>[20] M. S. Pervez and D. M. Farid, ‘‘Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs,’’ in Proc. 8th Int. Conf. Softw., Knowl., Inf. Manage. Appl. (SKIMA), Dec. 2014, pp. 1–6. <br>[21] H. Shapoorifard and P. Shamsinejad, ‘‘Intrusion detection using a novel hybrid method incorporating an improved KNN,’’ Int. J. Comput. Appl., vol. 173, no. 1, pp. 5–9, Sep. 2017. <br>[22] S. Bhattacharya, P. K. R. Maddikunta, R. Kaluri, S. Singh, T. R. Gadekallu, M. Alazab, and U. Tariq, ‘‘A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU,’’ Electronics, vol. 9, no. 2, p. 219, Jan. 2020. <br>[23] P. Parkar and A. Bilimoria, "A Survey on Cyber Security IDS using ML Methods," 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021, pp. 352-360, doi: 10.1109/ICICCS51141.2021.9432210. <br>[24] D. Gümüşbaş, T. Yıldırım, A. Genovese and F. Scotti, "A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems," in IEEE Systems Journal, vol. 15, no. 2, pp. 1717-1731, June 2021, doi: 10.1109/JSYST.2020.2992966. <br>[25] Y. Zhang, X. Chen, L. Jin, X. Wang and D. Guo, "Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data," in IEEE Access, vol. 7, pp. 37004-37016, 2019, doi: 10.1109/ACCESS.2019.2905041. <br>[26] Matthew Stewart, "Guide to Classification on Imbalanced Datasets”, https://resources.experfy.com/ai-ml/imbalanced-datasets-guide-classification/, December 1, 2020. <br>[27] C. Vij and H. Saini, "Intrusion Detection Systems: Conceptual Study and Review," 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), 2021, pp. 694-700, doi: 10.1109/ISPCC53510.2021.9609481. <br>[28] Ziadoon Kamil Maseer, Robiah Yusof, Nazrulazhar Bahaman, Salama A. Mostafa, and Cik Feresa Mohd Foozy, “Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset,” IEEE, VOLUME 9, February 3, 2021. <br>[29] Subiksha Srinivasa Gopalan1, Dharshini Ravikumar1, Dino Linekar, Ali Raza1, Maheen Hasib, “Balancing Approaches towards ML for IDS: A Survey for the CSE-CIC IDS Dataset,” 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), IEEE, 2021. <br>[30] Lan Liu, Pengcheng Wang, Jun Lin, and Langzhou Liu, “Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning,” vol. 9, December 2021 <br>[31] Moustafa, Nour, and Jill Slay. "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)." Military Communications and Information Systems Conference (MilCIS), 2015. IEEE, 2015. <br>[32] C. Kolias et al. “Intrusion Detection in 802.11 Networks”, IEEE communication surveys & tutorials, vol. 18, no. 1, first quarter 2016 <br>[33] Laurens D'hooge (UGent), Tim Wauters (UGent), Bruno Volckaert (UGent) and Filip De Turck (UGent) “Classification Hardness for Supervised Learners on 20 Years of Intrusion Detection Data.” IEEE ACCESS, vol. 7, 2019, pp. 167455–69. <br>[34] A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018) was accessed on 01/01/2022 from https://registry.opendata.aws/cse-cic-ids2018. <br>[35] Mbow, M., Koide, H., & Sakurai, K. (2021). An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning. In Proceedings - 2021 9th International Symposium on Computing and Networking, CANDAR 2021 (pp. 38-47). (Proceedings - 2021 9th International Symposium on Computing and Networking, CANDAR 2021). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/CANDAR53791.2021.00013 <br>[36] G. Karatas, O. Demir and O. K. Sahingoz, "Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset," in IEEE Access, vol. 8, pp. 32150-32162, 2020, doi: 10.1109/ACCESS.2020.2973219. <br>[37] Xiangyu Ma and Wei Shi, “AESMOTE: Adversarial Reinforcement Learning with SMOTE for Anomaly Detection”, IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, April-June 2021 <br>[38] Fadi Aloul, Imran Zualkernan, Nada Abdalgawad, Lana Hussain, Dara Sakhnini, “Network Intrusion Detection on the IoT Edge Using Adversarial Autoencoders,” 2021 International Conference on Information Technology (ICIT). <br>[39] M Lopez-Martin, B. Carro and A Sanchez-Esguevillas, “Variational data generative model for intrusion detection”. Knowledge and Information Systems (2018). https://doi.org/10.1007/s10115-018-1306-7 <br>[40] X. Jiao and J. Li, "An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism," 2021 18th International Conference on Privacy, Security and Trust (PST), 2021, pp. 1-6, doi: 10.1109/PST52912.2021.9647756. <br>[41] J. L. Leevy, T. M. Khoshgoftaar, B. R. A., and S. N., “A survey on addressing high-class imbalance in big data,” J. Big Data, vol. 5, no. 42, 2018. <br>[42] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in Int. Conf. Learn. Represent., 2015. <br>[43] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proc. IEEE Conf. Comput. Vision Pattern Recognit., 2016, pp. 770–778. <br>[44] N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE Trans. Emerg. Top. Comput. Intell., vol. 2, no. 1, pp. 41–50, 2018. <br>[45] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, “Deep learning approach for network intrusion detection in software defined networking,” in Proc. Int. Conf. Wirel. Netw. Mob. Commun., 2016, pp. 258–263. <br>[46] “NSL-KDD dataset,” https://www.unb.ca/cic/datasets/nsl.html, Canadian Institute of Cybersecurity <br>[47] M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,” Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009. <br>[48] H. Hota and A. Shrivas, “Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS),” Intelligent Computing, Networking, and Informatics, 845–851, 2014. <br>[49] R. Abdulhammed, M. Faezipour, A. Abuzneid, and A. Abu Mallouh, ``Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic,'' IEEE sensors Lett., vol. 3, no. 1, Art. no. 7101404, Jan. 2019. <br>[50] P.-J. Chuang and D.-Y.Wu, ``Applying deep learning to balancing network intrusion detection datasets,'' in Proc. IEEE 11th Int. Conf. Adv. Infocomm Technol. (ICAIT), pp. 213_217, Oct. 2019. <br>[51] P. Bedi, N. Gupta, and V. Jindal, ``Siam-IDS: Handling class imbalance problem in intrusion detection systems using siamese neural network,'' Procedia Comput. Sci., vol. 171, pp. 780_789, 2020. <br>[52] A. Ali, S. M. Shamsuddin, and A. L. Ralescu, “Classification with class imbalance problem: A review,” Int. J. Adv. Soft Comput. Its Appl., vol. 7, no. 3, pp. 176–204, 2015. <br>[53] R. Qaddoura, A. M. Al-Zoubi, I. Almomani and H. Faris, "Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach," 2021 International Conference on Information Technology (ICIT), 2021, pp. 858-863, doi: 10.1109/ICIT52682.2021.9491634. <br>[54] Hasan Ersan YAĞCI, “https://hersanyagci.medium.com/under-sampling-methods-for-imbalanced-data-clustercentroids-randomundersampler-nearmiss-eae0eadcc145,” Jul 15, 2021 <br>[55] S. J. Yen and Y. S. Lee, “Under-sampling approaches for improving prediction of the minority class in an imbalanced dataset,” Intell. Control Automat., vol. 344, pp. 731–740, 2006. <br>[56] L. Bao, C. Juan, J. Li, and Y. Zhang, “Boosted near-miss under-sampling on svm ensembles for concept detection in large-scale imbalanced datasets,” Neurocomputing, vol. 172, pp. 198–206, 2016. <br>[57] Y. Kamei, A. Monden, S. Matsumoto, T. Kakimoto, and K. Matsumoto, “The effects of over and under sampling on fault-prone module detection,” in Proc. First Int. Symp. Empirical Softw. Eng. Meas., (Madrid, Spain), 2007. <br>[58] N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, ‘‘SMOTE: Synthetic minority over-sampling technique,’’ J. Artif. Intell. Res., vol. 16, pp. 321–357, Jun. 2002 <br>[59] R. Blagus and L. Lusa, “Smote for high-dimensional class-imbalanced data,” Blagus Lusa BMC Bioinf., vol. 14, p. 106, 2013. <br>[60] Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, W. Philip Kegelmeyer, “SMOTE: Synthetic Minority Over-sampling Technique”, Journal of Artificial Intelligence Research 16 (2002) 321–357 <br>[61] Sornxayya Phetlasy, Satoshi Ohzahata, Celimuge Wu, and Toshihito Kato, “Applying SMOTE for a Sequential Classifiers Combination Method to Improve the Performance of Intrusion Detection System,” IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, 2019 <br>[62] N. Qazi, and K. Raza, “Effect of feature selection, synthetic minority over-sampling (SMOTE) and under-sampling on class imbalance classification,” 14th International conference on modelling and simulation, pp. 145-150, 2012. <br>[63] A. Tesfahun, and D. L. Bhaskari, “Intrusion detection using random forests classifier with SMOTE and feature reduction,” International conference on cloud & ubiquitous computing & emerging technologies, pp. 127-132, 2013 <br>[64] Y. Sun, and F. Liu, “SMOTE-NCL: A re-sampling method with filter for network intrusion detection,” 2nd IEEE International conference on computer and communications, pp. 1157-1161, 2016. <br>[65] P. Jeatrakul, K. W. Wong, and C. C. Fung, ‘‘Classification of imbalanced data by combining the complementary neural network and smote algorithm,’’ in Proc. Int. Conf. Neural Inf. Process. Springer, 2010, pp. 152–159. <br>[66] B. Yan and G. Han, ‘‘LA-GRU: Building combined intrusion detection model based on imbalanced learning and gated recurrent unit neural network,’’ Secur. Commun. Netw., vol. 2018, pp. 1–13, Aug. 2018. <br>[67] A. R. Gad, A. A. Nashat and T. M. Barkat, "Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset," in IEEE Access, vol. 9, pp. 142206-142217, 2021, doi: 10.1109/ACCESS.2021.3120626. <br>[68] T N Varunram, Shivaprasad M B, Aishwarya K H, Anush Balraj, Savish S V, and Ullas S, " Analysis of Different Dimensionality Reduction Techniques and Machine Learning Algorithms for an Intrusion Detection System," 2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA). <br>[69] G. Batista, B. Bazzan, M. Monard, “Balancing Training Data for Automated Annotation of Keywords: A Case Study,” In WOB, 10-18, 2003 <br>[70] K. Matsuda and K. Murase, "Single-Layered Complex-Valued Neural Network with SMOTE for Imbalanced Data Classification," 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), 2016, pp. 349-354, doi: 10.1109/SCIS-ISIS.2016.0079. <br>[71] B. Yan, G. Han, M. Sun and S. Ye, "A novel region adaptive SMOTE algorithm for intrusion detection on imbalanced problem," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017, pp. 1281-1286, doi: 10.1109/CompComm.2017.8322749. <br>[72] T. E. Tallo and A. Musdholifah, "The Implementation of Genetic Algorithm in Smote (Synthetic Minority Oversampling Technique) for Handling Imbalanced Dataset Problem," 2018 4th International Conference on Science and Technology (ICST), 2018, pp. 1-4, doi: 10.1109/ICSTC.2018.8528591. <br>[73] Erwin Kurniawan, Fhira Nhita, Annisa Aditsania, and Deni Saepudin, “C5.0 Algorithm and Synthetic Minority Oversampling Technique (SMOTE) for Rainfall Forecasting in Bandung Regency,” 2019 7th International Conference on Information and Communication Technology (ICoICT). <br>[74] Ilyas Adeleke Jimoh, Idris Ismaila, and Morufu Olalere, “Enhanced Decision Tree - J48 With SMOTE Machine Learning Algorithm for Effective Botnet Detection in Imbalance Dataset,” 15th International Conference on Electronics Computer and Computation (ICECCO 2019). <br>[75] T. Lu, Y. Huang, W. Zhao and J. Zhang, "The Metering Automation System based Intrusion Detection Using Random Forest Classifier with SMOTE+ENN," 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT), 2019, pp. 370-374, doi: 10.1109/ICCSNT47585.2019.8962430. <br>[76] C. Andrieu, N. de Freitas, A. Doucet, and M. I. Jordan, “An introduction to MCMC for machine learning,” Mach. Learn., vol. 50, no. 1-2, pp. 5–43, 2003. <br>[77] N. Metropolis and S. Ulam, “The Monte Carlo method,” J. Am. Stat. Assoc., vol. 44, no. 247, pp. 335–341, 1949. <br>[78] S. Geman and D. Geman, “Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 6, no. 5-6, pp. 721–741, 1984. <br>[79] K. P. Murphy, Machine learning: A probabilistic perspective, The MIT Press., 2012. <br>[80] G. C. Wei and M. A. Tanner, “A Monte Carlo implementation of the EM algorithm and the poor man’s data augmentation algorithms,” J. Am. Stat. Assoc., vol. 85, no. 411, pp. 699–704, 1990. <br>[81] N. Abedzadeh, M. Jacobs, “Using Markov Chain Monte Carlo Algorithm for Sampling Imbalance IDS Datasets”, The 31st International Conference on Computer Communications and Networks (ICCCN 2022), July 25 - July 28, 2022, Submitted for review. <br>[82] He Zhang, Xingtui Yu, Han Xiao, Peng Ren, Chunbo Luo, and Geyong Min, “Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework” draft paper, January 2019. Preprint available in link “https://arxiv.org/pdf/1901.07949.pdf“ downloaded January 2022. <br>[83] A. Servin, “Multi-Agent Reinforcement Learning for Intrusion Detection”. PhD thesis, University of York. 2009. <br>[84] K. Malialis, “Distributed Reinforcement Learning for Network Intrusion Response”, PhD thesis, University of York. 2014. <br>[85] M. Li, Y. Sun, H. Lu, S. Maharjan, and Z. Tian, “Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems,” IEEE Internet Things J., 2020. <br>[86] M. A. Wiering et al., "Reinforcement learning algorithms for solving classification problems,” IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning (ADPRL), Paris, 2011, pp. 91-96. <br>[87] M. G. Lagoudakis and R. Parr, “Reinforcement Learning as Classification: Leveraging Modern Classifiers” In Proceedings of the 20th International Conference on Machine Learning (ICML-03), 424–431, 2003, Washington, DC, USA. <br>[88] K. H. Quah, C. Quek and G. Leedham, "Pattern classification using fuzzy adaptive learning control network and reinforcement learning," Proceedings of the 9th International Conference on Neural Information Processing. ICONIP '02., Singapore, 2002, pp. 1439-1443 vol.3. 2002. <br>[89] G. Caminero and B. Lopez-Martin, M. Carro, “Adversarial environment reinforcement learning algorithm for intrusion detection,” Comput. Netw., vol. 159, pp. 96–109, 2019. <br>[90] R. Elderman et al., “Adversarial Reinforcement Learning in a Cyber Security Simulation” International Conference on Agents and Artificial Intelligence (ICAART 2017). <br>[91] M. Zhu, Z. Hu and P. Liu, “Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed” Proceedings of the First ACM Workshop on Moving Target Defense, Pages 51-58, 2014. <br>[92] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in Proc. Adv. Neural Inf. Process. Syst., 2014, pp. 2672–2680. <br>[93] H. Zhang, C. Luo, X. Yu, and P. Ren, “Mcmc based generative adversarial networks for handwritten numeral augmentation,” in Proc. Int. Conf. Commun. Signal Process. Syst., 2017, pp. 2702–2710. <br>[94] J. Wu, C. Zhang, T. Xue, B. Freeman, and J. Tenenbaum, “Learning a probabilistic latent space of object shapes via 3d generative-adversarial modeling,” in Proc. Adv. Neural Inf. Process. Syst., 2016, pp. 82–90 <br>[95] M. Arjovsky, S. Chintala, and L. Bottou, “Wasserstein generative adversarial networks,” in Proc. Int. Conf. Mach. Learn., 2017, pp. 214– 223. <br>[96] M. Arjovsky and L. Bottou, “Towards principled methods for training generative adversarial networks,” in Int. Conf. Learn. Represent., 2017. <br>[97] Peng Shi, Xuebing Chen, Xiangying Kong, and Xianghui Cao, “SE-IDS: A Sample Equalization Method for Intrusion Detection in Industrial Control System,” 36th Youth Academic Annual Conference of Chinese Association of Automation (YAC), 2021. <br>[98] A. Makhzani, J. Shlens, N. Jaitly, I. Goodfellow, and B. Frey, “Adversarial Autoencoders,” ArXiv151105644 Cs, May 2016. Available at: http://arxiv.org/abs/1511.05644. <br>[99] Fadi Aloul, Imran Zualkernan, Nada Abdalgawad, Lana Hussain, Dara Sakhnini, “Network Intrusion Detection on the IoT Edge Using Adversarial Autoencoders,” 2021 International Conference on Information Technology (ICIT) </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10