Analysing Network Intrusion Data
نویسنده
چکیده
Developmening systems applying machine learning and data mining techniques is one of the approaches to combating network intrusion.Many IDS Intrusion Detection Systems)suffer from a high rate of false alarms and missed intrusions.Tha challenge is to be able to improve the intrusion detection rate at a reduced false positive rate. To counter imbalance in data, a combination of oversampling (synthetic generation using SMOTE) and undersampling techniques had been employed. Two classifier models have been evaluated, Random Forest and Support Vector Machines. Data being used is the KDD Cup 99 data. The results of the experiment shows reasonable improvement in evaluating minority classes through oversampling and under sampling techniques.
منابع مشابه
Evaluation of Intrusion Detection Systems
This paper proposes a group of criteria for evaluating Intrusion Detection Systems (IDS for short). In this article, an existing evaluation strategy of intrusion detection system is going to be briefly introduced as a case to be assessed against our proposed criteria. Intrusion Detection Systems are critical components to the primary defence of computer system and network security. An evaluatio...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کامل