Computer Network Attack Detection Using Enhanced Clustering Technologies

نویسندگان

چکیده

The need for security means has brought from the fact of privacy data especially after communication revolution in recent times. advancement mining and machine learning technology paved road establishment an efficient attack prediction paradigm protecting large scaled networks. In this project, computer network intrusions had been eliminated by using smart algorithm. Referring a big dataset named as KDD intrusion which includes number connections that diagnosed with several types attacks; model is established predicting type through data. Feed forward neural outperformed over other proposed clustering models accuracy.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning

During the last few years the computer network security remains a problem of great concern within information technology research area. Increase of network scale, development of advanced information technologies, and other factors enhance the number of possible targets for attacks against computer networks. These factors negatively influence upon the efficiency of the existing computer networks...

متن کامل

Fuzzy Preference Approach for Computer Network Attack Detection

Irrepressible growth of complex interconnectedness of information systems besides its obvious benefits unfortunately brought up the questions of their vulnerability. Practically universal access to computers has enabled hackers and would-be terrorists to attack information systems and critical infrastructures worldwide. Fuzzy preference relation, based on fuzzy satisfaction function is applied ...

متن کامل

Hybrid Intrusion Detection for Anomaly & Misuse Attack using Clustering in Wireless Sensor Network

Wireless Sensor Networks (WSNs) are employed in variety of platforms that have prospective to be used in different area such as civil area, military & many more. Wireless Sensor Network is commonly set up in absent & unfriendly environments. The WSN security is affected by various threats & physically & logically may damage itself. So it is necessary to protect entire network with the help of m...

متن کامل

Enhanced TCP SYN Attack Detection

In this paper, we analyze the stateless SYNSYN&ACK and SYN-FIN/RST detection mechanisms for TCP SYN attacks. We indicate the inherent vulnerability of the SYN-FIN/RST detection mechanism caused by the computation of the RST packet counts. We indicate why SYNSYN&ACK is a more efficient and reliable detection mechanism than SYN-FIN/RST. We come up with ‘Bot Buddies’ for TCP SYN attacks and explai...

متن کامل

Network Intrusion Detection Using Genetic Clustering

We apply the Unsupervised Niche Clustering (UNC), a genetic niching technique for robust and unsupervised clustering, to the intrusion detection problem. Using the normal samples, UNC generates clusters sumarizing the normal space. These clusters can be characterized by fuzzy membership functions, that are later aggregated to determine a level of normality. Anomalies are identified by their low...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Asian Journal of Applied Sciences

سال: 2022

ISSN: ['1996-3343']

DOI: https://doi.org/10.24203/ajas.v9i6.6839