نتایج جستجو برای: kdd99

تعداد نتایج: 84  

Journal: :iranian journal of fuzzy systems 2014
mohammad reza moosavi mahsa fazaeli javan mohammad hadi sadreddini mansoor zolghadri jahromi

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

2016
Muhamad Erza Aminanto Kwangjo Kim

Numerous machine learning algorithms applied on Intrusion Detection System (IDS) to detect enormous attacks. However, it is difficult for machine to learn attack properties globally since there are huge and complex input features. Feature selection can overcome this problem by selecting the most important features only to reduce the dimensionality of input features. We leverage Artificial Neura...

2005
Yi Peng Gang Kou Yong Shi Zhengxin Chen

Optimization-based algorithms, such as Multi-Criteria Linear programming (MCLP), have shown their effectiveness in classification. Nevertheless, due to the limitation of computation power and memory, it is difficult to apply MCLP, or similar optimization methods, to huge datasets. As the size of today’s databases is continuously increasing, it is highly important that data mining algorithms are...

Journal: :JCP 2010
Dewan Md. Farid Mohammad Zahidur Rahman

Recently, research on intrusion detection in computer systems has received much attention to the computational intelligence society. Many intelligence learning algorithms applied to the huge volume of complex and dynamic dataset for the construction of efficient intrusion detection systems (IDSs). Despite of many advances that have been achieved in existing IDSs, there are still some difficulti...

Journal: :CoRR 2012
Mohammad Sazzadul Hoque Md. Abdul Mukit Md. Abu Naser Bikas

Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. There are various appro...

Journal: :CoRR 2016
Hongrui Wang Tao Lu Xiaodai Dong Peixue Li Michael Xie

We propose a novel hierarchical online intrusion detection system (HOIDS) for supervisory control and data acquisition (SCADA) networks based on machine learning algorithms. By utilizing the server-client topology while keeping clients distributed for global protection, high detection rate is achieved with minimum network impact. We implement accurate models of normal-abnormal binary detection ...

Journal: :Security and Communication Networks 2022

Current network security is becoming increasingly important, and intrusion detection an effective method to protect the from malicious attacks. This study proposes algorithm FLTrELM based on federated transfer learning extreme machine improve effect of detection, which implements data aggregation through facilitates construction personalized for all organizations. first builds a model solve pro...

2008
Xiangliang Zhang Cyril Furtlehner Michèle Sebag

This paper proposed StrAP (Streaming AP), extending Affinity Propagation (AP) to data steaming. AP, a new clustering algorithm, extracts the data items, or exemplars, that best represent the dataset using a message passing method. Several steps are made to build StrAP. The first one (Weighted AP) extends AP to weighted items with no loss of generality. The second one (Hierarchical WAP) is conce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید