Finding an Optimized Discriminate Function for Internet Application Recognition
نویسندگان
چکیده
Everyday the usages of the Internet increase and simply a world of the data become accessible. Network providers do not want to let the provided services to be used in harmful or terrorist affairs, so they used a variety of methods to protect the special regions from the harmful data. One of the most important methods is supposed to be the firewall. Firewall stops the transfer of such packets through several ways, but in some cases they do not use firewall because of its blind packet stopping, high process power needed and expensive prices. Here we have proposed a method to find a discriminate function to distinguish between usual packets and harmful ones by the statistical processing on the network router logs. So an administrator can alarm to the user. This method is very fast and can be used simply in adjacent with the Internet routers. Keywords— Data Mining, Firewall, Optimization, Packet classification, Statistical Pattern Recognition.
منابع مشابه
An Evaluation of Mahalanobis-Taguchi System and Neural Network for Multivariate Pattern Recognition
The Mahalanobis-Taguchi System is a diagnosis and predictive method for analyzing patterns in multivariate cases. The goal of this study is to compare the ability of the Mahalanobis- Taguchi System and a neural-network to discriminate using small data sets. We examine the discriminant ability as a function of data set size using an application area where reliable data is publicly available. The...
متن کاملThe Explanatory Model of the Internet Applications and its Role on the Youth Sexual Identity in Tehran
The aim of this study is presenting an explanatory model of the Internet applications and the role on the sexual identities’ of the-youth in Tehran. Also these sub-targets were evaluated: the amount of the youths’ familiarization with this technology by sex, the kind of programs used by the students by sex, the recognition of internet applications’ effect on the sexual - identity of the youth. ...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملApplication of Collocation Method in Finding Roots
In this paper we present a new method to find simple or multiple roots of functions in a finite interval. In this method using bisection method we can find an interval such that this function is one to one on it, thus we can transform problem of finding roots in this interval into an ordinary differential equation with boundary conditions. By solving this equation using collocation method we ca...
متن کاملتمایز دانشجویان دارای اهمالکاری تحصیلی و دانشجویان عادی بر اساس اعتیاد به اینترنت
Background and Objective: Computer and internet tools are necessary to facilitate the living of people today that had created risks. One of these risks can develop in the students' educational procrastination. This study aimed to discriminate normal students from those with educational procrastination based on internet addiction. Materials and Methods: The research method of this study was c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005