Network intrusion detection using data dimensions reduction techniques

نویسندگان

چکیده

Abstract Due to the increasing growth of Internet and its widespread application, number attacks on network has also increased. Therefore, maintaining security using intrusion detection systems is critical importance. The connection between devices leads a large data being generated saved. era “big data” emerges over time. This paper presents new method for selecting effective features based concept fuzzy numbers scoring methods correlation feature selection systems. goal this present approach reducing size In method, eliminate inefficient reduce dimensions, are defined as number, heuristic function correlation-based algorithm expressed triangular membership function. To evaluate proposed it then compared previous methods. results show that selects several less than conventional with higher rate. two datasets. evaluated validated KDD Cup, NSL-KDD CICIDS achieved accuracy 99.9% which 96.01% CFS method.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Representation and Reduction of Network Intrusion Detection Data

We have investigated various representation and reduction schemes, including useful binning methods, efficient wavelet coefficients, as well as effective data fusion approaches for network intrusion detection data collected by the prototype Hierarchical Intrusion DEtection (HIDE) system. HIDE is a hierarchical, multi-tier, multi-observation-window anomaly based network intrusion detection syste...

متن کامل

Data Mining Techniques for (Network) Intrusion Detection Systems

In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data mining techniques that are being used for such purposes. We debate on the advantages and disadvantages of thes...

متن کامل

Network Intrusion Detection Using Data Mining and Network Behaviour Analysis

Intrusion detection has become a critical component of network administration due to the vast number of attacks persistently threaten our computers. Traditional intrusion detection systems are limited and do not provide a complete solution for the problem. They search for potential malicious activities on network traffics; they sometimes succeed to find true security attacks and anomalies. Howe...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

Network Intrusion Detection using Machine Learning and Voting techniques

As the result of recent advent and rapid growth of the Internet, there have been an increasing number of corporations relying on computers and networks for communications and critical business transactions. Because of the network complexity and advanced hacking techniques, such reliance on computer networks often presents unanticipated risks and vulnerabilities. A huge volume of attacks on majo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Big Data

سال: 2023

ISSN: ['2196-1115']

DOI: https://doi.org/10.1186/s40537-023-00697-5