Network intrusion detection using data dimensions reduction techniques
نویسندگان
چکیده
Abstract Due to the increasing growth of Internet and its widespread application, number attacks on network has also increased. Therefore, maintaining security using intrusion detection systems is critical importance. The connection between devices leads a large data being generated saved. era “big data” emerges over time. This paper presents new method for selecting effective features based concept fuzzy numbers scoring methods correlation feature selection systems. goal this present approach reducing size In method, eliminate inefficient reduce dimensions, are defined as number, heuristic function correlation-based algorithm expressed triangular membership function. To evaluate proposed it then compared previous methods. results show that selects several less than conventional with higher rate. two datasets. evaluated validated KDD Cup, NSL-KDD CICIDS achieved accuracy 99.9% which 96.01% CFS method.
منابع مشابه
Representation and Reduction of Network Intrusion Detection Data
We have investigated various representation and reduction schemes, including useful binning methods, efficient wavelet coefficients, as well as effective data fusion approaches for network intrusion detection data collected by the prototype Hierarchical Intrusion DEtection (HIDE) system. HIDE is a hierarchical, multi-tier, multi-observation-window anomaly based network intrusion detection syste...
متن کاملData Mining Techniques for (Network) Intrusion Detection Systems
In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data mining techniques that are being used for such purposes. We debate on the advantages and disadvantages of thes...
متن کاملNetwork Intrusion Detection Using Data Mining and Network Behaviour Analysis
Intrusion detection has become a critical component of network administration due to the vast number of attacks persistently threaten our computers. Traditional intrusion detection systems are limited and do not provide a complete solution for the problem. They search for potential malicious activities on network traffics; they sometimes succeed to find true security attacks and anomalies. Howe...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کاملNetwork Intrusion Detection using Machine Learning and Voting techniques
As the result of recent advent and rapid growth of the Internet, there have been an increasing number of corporations relying on computers and networks for communications and critical business transactions. Because of the network complexity and advanced hacking techniques, such reliance on computer networks often presents unanticipated risks and vulnerabilities. A huge volume of attacks on majo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Big Data
سال: 2023
ISSN: ['2196-1115']
DOI: https://doi.org/10.1186/s40537-023-00697-5