نتایج جستجو برای: پایگاه داده nsl kdd

تعداد نتایج: 219169  

Journal: :Tsinghua Science & Technology 2021

In recent years, machine learning-based cyber intrusion detection methods have gained increasing popularity. The number and complexity of new attacks continue to rise; therefore, effective intelligent solutions are necessary. Unsupervised learning techniques particularly appealing systems since they can detect known unknown types as well zero-day attacks. the current paper, we present an unsupe...

Journal: :Academic journal of science and technology 2022

Network intrusion detection is an important research direction in the field of network security. The traditional algorithm based on feature extraction and separation, which has problems low accuracy high false alarm rate. In order to improve detection, this paper proposes model deep asymmetric convolutional encoder Random Forest(RF). First, use DACAE extract features from preprocessed data, the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده کامپیوتر و فناوری اطلاعات 1392

با توسعه همه جانبه استفاده از شبکه های کامپیوتری، تهدیدات ناشی از اجرای حملات انکار سرویس توزیع شده در حال افزایش است به شکلی که این دسته از اختلالات به راحتی می توانند منابع ارتباطی و محاسباتی سیستم یا سیستم های قربانی را در مدت زمان کوتاهی از ارائه خدمت به کاربران قانونی خود باز دارند. در این تحقیق، مجموعه ای خلاقانه از تفکیک کننده های فازی-عصبی نوع سوگنو برای تشخیص حملات انکار سرویس توزیع شد...

2014
Shahaboddin Shamshirband Nor Badrul Anuar Mat Kiah Sanjay Misra

Wireless networks are increasingly overwhelmed by Distributed Denial of Service (DDoS) attacks by generating flooding packets that exhaust critical computing and communication resources of a victim’s mobile device within a very short period of time. This must be protected. Effective detection of DDoS attacks requires an adaptive learning classifier, with less computational complexity, and an ac...

Journal: :IEICE Transactions 2017
Bayu Adhi Tama Kyung Hyune Rhee

Anomaly detection is one approach in intrusion detection systems (IDSs) which aims at capturing any deviation from the profiles of normal network activities. However, it suffers from high false alarm rate since it has impediment to distinguish the boundaries between normal and attack profiles. In this paper, we propose an effective anomaly detection approach by hybridizing three techniques, i.e...

2017
Christopher D. McDermott Andrei Petrovski

Wireless Sensor Networks (WSNs) have become a key technology for the IoT and despite obvious benefits, challenges still exist regarding security. As more devices are connected to the internet, new cyber attacks are emerging which join well-known attacks posing significant threats to the confidentiality, integrity and availability of data in WSNs. In this work, we investigated two computational ...

Journal: :CoRR 2014
Amira Sayed A. Aziz Ahmad Taher Azar Aboul Ella Hassanien Sanaa El-Ola Hanafi

Network security is a growing issue, with the evolution of computer systems and expansion of attacks. Biological systems have been inspiring scientists and designs for new adaptive solutions, such as genetic algorithms. In this paper, we present an approach that uses the genetic algorithm to generate anomaly network intrusion detectors. In this paper, an algorithm propose use a discretization m...

2016
Shruti Dubb Yamini Sood

Intrusion detection system (IDS) is the system which identifies malicious activity on the network. As the Internet volume is expanding quickly, security against the constant assaults and their quick discovery issues pick up consideration of numerous specialists. Information mining techniques can be adequately connected to IDS to handle the issues of IDS. It can lessen the time intricacy by sele...

Journal: :CoRR 2013
Mohamed Faisal Elrawy T. K. Abdelhamid Abdelfatah M. Mohamed

Data Security has become a very serious part of any organizational information system. Internet threats have become more intelligent so it can deceive the basic security solutions such as firewalls and antivirus scanners. To enhance the overall security of the network an additional security layer such as intrusion detection system (IDS) has to be added. The anomaly detection IDS is a type of ID...

Journal: :IEEE Transactions on Cloud Computing 2022

Security issues have resulted in severe damage to the cloud computing environment, adversely affecting healthy and sustainable development of computing. Intrusion detection is one technologies for protecting environment from malicious attacks. However, network traffic characterized by large scale, high dimensionality, redundancy, these characteristics pose serious challenges intrusion systems. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید