An approach to reduce data dimension in building effective Network Intrusion Detection Systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Building Block Approach to Intrusion Detection

This paper details the design and implementation of a host-based intrusion detection system (Hewlett-Packard’s Praesidium IDS/9000) and a specialized kernel data source which supplies customized data to the IDS. Instead of the common attack-signature matching used in most other intrusion detection systems, IDS/9000 performs real-time monitoring of the system looking for misuse actions that are ...

متن کامل

Negative Selection Approach Application in Network Intrusion Detection Systems

Nature has always been an inspiration to researchers with its diversity and robustness of its systems, and Artificial Immune Systems are one of them. Many algorithms were inspired by ongoing discoveries of biological immune systems techniques and approaches. One of the basic and most common approach is the Negative Selection Approach, which is simple and easy to implement. It was applied in man...

متن کامل

Building intrusion pattern miner for Snort network intrusion detection system

In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a col...

متن کامل

Building an Application Data Behavior Model for Intrusion Detection

Application level intrusion detection systems usually rely on the immunological approach. In this approach, the application behavior is compared at runtime with a previously learned application profile of the sequence of system calls it is allowed to emit. Unfortunately, this approach cannot detect anything but control flow violation and thus remains helpless in detecting the attacks that aim p...

متن کامل

Network Intrusion Detection using Clustering: A Data Mining Approach

Network intrusion detection system includes identifying a set of spiteful actions that compromises the basic security requirements such as integrity, confidentiality, and availability of information resources. The enormous increase in network attacks has made the data mining based intrusion detection techniques extremely useful in detecting the attacks. This paper

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EAI Endorsed Transactions on Context-aware Systems and Applications

سال: 2019

ISSN: 2409-0026

DOI: 10.4108/eai.13-7-2018.162633