Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yin, Yuhua | - |
dc.contributor.author | Jang-Jaccard, Julian | - |
dc.contributor.author | Sabrina, Fariza | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2023-01-01 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36941 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85164708592&origin=inward | - |
dc.description.abstract | The network intrusion threats are increasingly severe with the application of computer supported coorperative work. Machine learning algorithms have been widely used in intrusion detection systems, including Multi-layer Perceptron (MLP). In this study, we proposed a two-stage model that combines the Birch clustering algorithm and MLP classifier to improve the performance of network anomaly multi-classification. In our proposed method, we first apply Birch or K-means as an unsupervised clustering algorithm to the CICIDS-2017 dataset to pre-group the data. The generated pseudo-label is then added as an additional feature to the training of the MLP-based classifier. The experimental results show that using Birch and K-Means clustering for data pre-grouping can improve intrusion detection system performance. Our method can achieve 99.73% accuracy in multi-classification using Birch clustering, which is better than similar researches using a stand-alone MLP model. | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Anomaly detection | - |
dc.subject.mesh | CICIDS2017 dataset | - |
dc.subject.mesh | Clusterings | - |
dc.subject.mesh | Intrusion Detection Systems | - |
dc.subject.mesh | Intrusion-Detection | - |
dc.subject.mesh | Machine learning algorithms | - |
dc.subject.mesh | Multi-classification | - |
dc.subject.mesh | Multilayers perceptrons | - |
dc.subject.mesh | Network anomaly detection | - |
dc.subject.mesh | Network intrusions | - |
dc.title | Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2023.5.24. ~ 2023.5.26. | - |
dc.citation.conferenceName | 26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023 | - |
dc.citation.edition | Proceedings of the 2023 26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023 | - |
dc.citation.endPage | 431 | - |
dc.citation.startPage | 423 | - |
dc.citation.title | Proceedings of the 2023 26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023 | - |
dc.identifier.bibliographicCitation | Proceedings of the 2023 26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023, pp.423-431 | - |
dc.identifier.doi | 10.1109/cscwd57460.2023.10152640 | - |
dc.identifier.scopusid | 2-s2.0-85164708592 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10152543 | - |
dc.subject.keyword | Anomaly Detection | - |
dc.subject.keyword | CICIDS2017 dataset | - |
dc.subject.keyword | Clustering Algorithm | - |
dc.subject.keyword | Intrusion Detection | - |
dc.subject.keyword | Multi-classification | - |
dc.subject.keyword | Multilayer Perceptron | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | true | - |
dc.subject.subarea | Artificial Intelligence | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Computer Science Applications | - |
dc.subject.subarea | Hardware and Architecture | - |
dc.subject.subarea | Information Systems and Management | - |
dc.subject.subarea | Safety, Risk, Reliability and Quality | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.