Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most...
Saved in:
Main Authors: | Ying-Ti Tsai, Chung-Ho Wang, Yung-Chia Chang, Lee-Ing Tong |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2024/3948341 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Application of Residual-Based EWMA Control Charts for Detecting Faults in Variable-Air-Volume Air Handling Unit System
by: Haitao Wang
Published: (2016-01-01) -
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
by: Mo Shaohui, et al.
Published: (2022-05-01) -
CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks
by: Bishan Ying
Published: (2014-01-01) -
Intrusion Detection for Routing Attacks in Sensor Networks
by: Chong Eik Loo, et al.
Published: (2006-01-01) -
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
by: Jen-Yeu Chen, et al.
Published: (2012-12-01)