ACKNOWLEDGEMENTS
This research is partially funded by Italian Ministry
of Education, University and Research - Program
Smart Cities and Communities and Social Innovation
project ILEARNTV (D.D. n.1937 del 05.06.2014,
CUP F74G14000200008 F19G14000910008). We
gratefully acknowledge the support of NVIDIA Cor-
poration with the donation of the Titan Xp GPU used
for this research.
REFERENCES
Ahmed, M. A. and Mohamed, Y. A. (2018). Enhanc-
ing intrusion detection using statistical functions. In
2018 International Conference on Computer, Control,
Electrical, and Electronics Engineering (ICCCEEE),
pages 1–6. IEEE.
Brown, I. and Mues, C. (2012). An experimental compari-
son of classification algorithms for imbalanced credit
scoring data sets. Expert Syst. Appl., 39(3):3446–
3453.
Buczak, A. L. and Guven, E. (2016). A survey of data min-
ing and machine learning methods for cyber security
intrusion detection. IEEE Communications Surveys
and Tutorials, 18(2):1153–1176.
Carta, S., Fenu, G., Recupero, D. R., and Saia, R. (2019).
Fraud detection for e-commerce transactions by em-
ploying a prudential multiple consensus model. Jour-
nal of Information Security and Applications, 46:13–
22.
Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer,
W. P. (2002). Smote: synthetic minority over-
sampling technique. Journal of artificial intelligence
research, 16:321–357.
Chicco, D. (2017). Ten quick tips for machine learning in
computational biology. BioData mining, 10(1):35.
Cleary, S. and Hebb, G. (2016). An efficient and functional
model for predicting bank distress: In and out of sam-
ple evidence. Journal of Banking & Finance, 64:101–
111.
Deng, H., Zeng, Q.-A., and Agrawal, D. P. (2003).
Svm-based intrusion detection system for wireless ad
hoc networks. In 2003 IEEE 58th Vehicular Tech-
nology Conference. VTC 2003-Fall (IEEE Cat. No.
03CH37484), volume 3, pages 2147–2151. IEEE.
Fenu, G. and Surcis, S. (2009). A cloud computing based
real time financial system. In 2009 Eighth Inter-
national Conference on Networks, pages 374–379.
IEEE.
Ghorbani, A. A., Lu, W., and Tavallaee, M. (2010). Net-
work Intrusion Detection and Prevention - Concepts
and Techniques, volume 47 of Advances in Informa-
tion Security. Springer.
Japkowicz, N. and Stephen, S. (2002). The class imbal-
ance problem: A systematic study. Intell. Data Anal.,
6(5):429–449.
Kizza, J. M. (2017). Guide to Computer Network Secu-
rity, 4th Edition. Computer Communications and Net-
works. Springer.
Li, W. (2004). Using genetic algorithm for network intru-
sion detection. Proceedings of the United States De-
partment of Energy Cyber Security Group, 1:1–8.
Marino, D. L., Wickramasinghe, C. S., and Manic, M.
(2018). An adversarial approach for explainable ai
in intrusion detection systems. In IECON 2018-44th
Annual Conference of the IEEE Industrial Electronics
Society, pages 3237–3243. IEEE.
Munaiah, N., Meneely, A., Wilson, R., and Short, B. (2016).
Are intrusion detection studies evaluated consistently?
a systematic literature review.
Orfila, A., Carb
´
o, J., and Ribagorda, A. (2003). Fuzzy logic
on decision model for IDS. In The 12th IEEE Inter-
national Conference on Fuzzy Systems, FUZZ-IEEE
2003, St. Louis, Missouri, USA, 25-28 May 2003,
pages 1237–1242. IEEE.
Resende, P. A. A. and Drummond, A. C. (2018). A sur-
vey of random forest based methods for intrusion de-
tection systems. ACM Computing Surveys (CSUR),
51(3):48.
Saboori, E., Parsazad, S., and Sanatkhani, Y. (2012). Au-
tomatic firewall rules generator for anomaly detection
systems with apriori algorithm. CoRR, abs/1209.0852.
Saia, R. and Carta, S. (2016). A linear-dependence-based
approach to design proactive credit scoring models. In
KDIR, pages 111–120.
Saia, R., Carta, S., and Recupero, D. R. (2018). A
probabilistic-driven ensemble approach to perform
event classification in intrusion detection system. In
KDIR, pages 139–146. SciTePress.
Scherer, P., Vicher, M., Dr
´
azdilov
´
a, P., Martinovic, J.,
Dvorsk
`
y, J., and Sn
´
a
ˇ
sel, V. (2011). Using svm and
clustering algorithms in ids systems. In Proc. Int Conf.
Dateso 2011, 2011.
Sen, R., Chattopadhyay, M., and Sen, N. (2015). An
efficient approach to develop an intrusion detection
system based on multi layer backpropagation neural
network algorithm: Ids using bpnn algorithm. In
Proceedings of the 2015 ACM SIGMIS Conference
on Computers and People Research, pages 105–108.
ACM.
Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A. A.
(2009). A detailed analysis of the KDD CUP 99 data
set. In 2009 IEEE Symposium on Computational Intel-
ligence for Security and Defense Applications, CISDA
2009, Ottawa, Canada, July 8-10, 2009, pages 1–6.
IEEE.
Wang, G., Hao, J., Ma, J., and Huang, L. (2010). A new
approach to intrusion detection using artificial neu-
ral networks and fuzzy clustering. Expert Syst. Appl.,
37(9):6225–6232.
Yeo, L. H., Che, X., and Lakkaraju, S. (2017). Modern
intrusion detection systems. CoRR, abs/1708.07174.
A Discretized Extended Feature Space (DEFS) Model to Improve the Anomaly Detection Performance in Network Intrusion Detection
Systems
329