نتایج جستجو برای: پایگاه داده nsl kdd

تعداد نتایج: 219169  

Journal: : 2021

Intrusion detection system is responsible for monitoring the systems and detect attacks, whether on (host or a network) identifying attacks that could come to cause damage them, that’s mean an IDS prevents unauthorized access by giving alert administrator before causing any serious harm. As reasonable supplement of firewall, intrusion technology can assist deal with offensive, Intrusions Detect...

2015
Tamer F. Ghanem Wail S. Elkilani Hatem M. Abdul-kader

Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities. Different metaheuristic techniques have been used for anomaly detector generation. Yet, reported literature has not studied the use of the multi-start metaheuristic method for detector generation. This paper proposes a hybrid approach for anomal...

Journal: :International journal of electrical & electronics research 2021

Research in the field of IDS has been going on since long time; however, there exists a number ways to further improve efficiency IDS. This paper investigates performance Intrusion detection system using feature reduction and EBPA. The first step involves features, based combination information gain correlation. In next step, error back propagation algorithm (EBPA) is used train network then an...

Journal: :Mathematics 2023

This study presents a comprehensive exploration of the hyperparameter optimization in one-dimensional (1D) convolutional neural networks (CNNs) for network intrusion detection. The increasing frequency and complexity cyberattacks have prompted an urgent need effective intrusion-detection systems (IDSs). Herein, we focus on optimizing nine hyperparameters within 1D-CNN model, using two well-esta...

Journal: :Computers, materials & continua 2022

Intrusion Detection System (IDS) plays a crucial role in detecting and identifying the DoS DDoS type of attacks on IoT devices. However, anomaly-based techniques do not provide acceptable accuracy for efficacious intrusion detection. Also, we found many difficulty levels when applying IDS to devices attempted attacks. Given this background, designed solution detect intrusions using Convolutiona...

Journal: :Lecture notes in networks and systems 2022

With the growing rates of cyber-attacks and cyber espionage, need for better more powerful intrusion detection systems (IDS) is even warranted nowadays. The basic task an IDS to act as first line defense, in detecting attacks on internet. As tactics from intruders become sophisticated difficult detect, researchers have started apply novel Machine Learning (ML) techniques effectively detect henc...

2013
Karan Bajaj Amit Arora

With the growing need of internet in daily life and the dependence on the world wide system of computer networks, the network security is becoming a necessary requirement of our world to secure the confidential information available on the networks. Efficient intrusion detection is needed as a defence of the network system to detect the attacks over the network. Using feature selection, we redu...

Journal: :CoRR 2012
Heba Ezzat Ibrahim Sherif M. Badr Mohamed A. Shaheen

Security of computers and the networks that connect them is increasingly becoming of great significance. Intrusion detection system is one of the security defense tools for computer networks. This paper compares two different model Approaches for representing intrusion detection system by using decision tree techniques. These approaches are Phase-model approach and Level-model approach. Each mo...

2016
Krishan Kumar Gulshan Kumar

Feature Selection plays the very important role in Intrusion Detection System. One of the major challenge these days is dealing with large amount of data extracted from the network that needs to be analyzed. Feature Selection helps in selecting the minimum number of features from the number of features that need more computation time, large space, etc. This paper, analyzed different feature sel...

Journal: :Bitlis Eren üniversitesi fen bilimleri dergisi 2023

Recently, the need for Network-based systems and smart devices has been increasing rapidly. The use of in almost every field, provision services by private public institutions over network servers, cloud technologies database are completely remotely controlled. Due to these requirements systems, malicious software users, unfortunately, their interest areas. Some organizations exposed hundreds o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید