Identification of Network Traffic Intrusion Using Decision Tree

نویسندگان

چکیده

Network technology plays an increasingly important role in all aspects of social life. The Internet has brought a new round industrial revolution and upgrading. arrival the “Internet” era is accompanied by large-scale increase network applications number netizens. At same time, severity cyberattacks continue to increase. Therefore, intrusion detection systems (IDSs) have become part current security infrastructure various industries. Anomaly traffic data effective method for protection. In order better realize anomalies, several algorithms been successfully applied. Most them come from artificial intelligence (AI), but there general problem excessive model execution processing time low rates. And through lot research, it found that most models do not pay enough attention early stage. this paper, we optimize normalization process series experiments combine PCA feature selection propose optimized MaxAbs-DT classifier model. To train measure performance model, used NSL-KDD dataset, which benchmark dataset anomaly models. experimental results show outperforms other existing validates effectiveness method. addition, its greatly reduced compared many

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Intrusion Detection Using Improved Decision Tree Algorithm

Intrusion detection involves a lot of tools that are used to identify different types of attacks against computer systems and networks. With the development of network technologies and applications network attacks are greatly increasing both in number and severe. Open source and commercial network intrusion detection tools are not able to predict new type of attacks based on the previous attack...

متن کامل

Network Intrusion Detection Using FP Tree Rules

----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons of loss for web merchants. Advanced solutions are needed to protect e-businesses from the constant problems of fraud. Many popular fraud detection algorithms require supervised training, which needs human intervention...

متن کامل

Anomaly Base Network Intrusion Detection by Using Random Decision Tree and Random Projection: A Fast Network Intrusion Detection Technique

Network Intrusion Detection Systems (NIDSs) have become an important component in network security infrastructure. Currently, many NIDSs are rule-based systems whose performances highly depend on their rule sets. Unfortunately, due to the huge volume of network traffic, coding the rules by security experts becomes difficult and time-consuming. Since data mining techniques can build network intr...

متن کامل

assessment of the efficiency of s.p.g.c refineries using network dea

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

Early Prediction of Gestational Diabetes Using ‎Decision Tree and Artificial Neural Network Algorithms

Introduction: Gestational diabetes is associated with many short-term and long-term complications in mothers and newborns; hence, the detection of its risk factors can contribute to the timely diagnosis and prevention of relevant complications. The present study aimed to design and compare Gestational diabetes mellitus (GDM) prediction models using artificial intelligence algorithms. Materials ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Sensors

سال: 2023

ISSN: ['1687-725X', '1687-7268']

DOI: https://doi.org/10.1155/2023/5997304