نتایج جستجو برای: kdd cup 99

تعداد نتایج: 84698  

2014
Xuesen Cai Fanhua Yu

In order to improve the efficiency of network intrusion detection, this paper proposes a wavelet transform based support vector machine ensemble algorithm. Firstly, we use wavelet transform to remove the redundant attributes from the original dataset. Then we train a support vector machine ensemble on the simplified dataset. As the wavelet transform in this algorithm can effectively remove the ...

2014

In this chapter the anomaly detection by using Hybrid Artificial Immune Algorithm (HAIA) is presented. The HAIA is based on AIS and GA. In this research work, HAIA approach is used to develop Network Anomaly Detection System (NADS). The detector set is generated by using GA and the anomalies are identified using NSA which is based on AIS. The HAIA algorithm is tested with KDD Cup 99 benchmark d...

2007
Amparo Alonso-Betanzos Noelia Sánchez-Maroño Félix M. Carballal-Fortes Juan A. Suárez-Romero Beatriz Pérez-Sánchez

Intrusion detection is a problem that has attracted a great deal of attention from computer scientists recently, due to the exponential increase in computer attacks in recent years. DARPA KDD Cup 99 is a standard dataset for classifying computer attacks, to which several machine learning techniques have been applied. In this paper, we describe the results obtained using functional networks – a ...

2011
Vikram Chopra Sunil Saini Amit Kumar Choudhary

Research in the field of computer and network science demands for tools and methodology to test their security effectively. Intrusion Detection System is used to perform the same with a fact that an intruder’s behavior will be noticeably different from that of a legitimate user and would exploit security vulnerabilities. Proposed here is a novel intrusion detection approach with the application...

2009
Alexandru Niculescu-Mizil Claudia Perlich Grzegorz Swirszcz Vikas Sindhwani Yan Liu Prem Melville Dong Wang Jing Xiao Jianying Hu Moninder Singh Wei Xiong Shang Yanfeng Zhu

We describe our wining solution for the KDD Cup Orange Challenge.

2005
Hilmi Günes Kayacik A. Nur Zincir-Heywood Malcolm I. Heywood

KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers working in the field of intrusion detection and is the only labeled dataset publicly available. Numerous researchers employed the datasets in KDD 99 intrusion detection competition to study the utilization of machine learning for intrusion detection and reported detection rates up to ...

Journal: :CoRR 2016
Jobin Wilson Ram Mohan Muhammad Arif Santanu Chaudhury Brejesh Lall

The crux of the problem in KDD Cup 2016 involves developing data mining techniques to rank research institutions based on publications. Rank importance of research institutions are derived from predictions on the number of full research papers that would potentially get accepted in upcoming top-tier conferences, utilizing public information on the web. This paper describes our solution to KDD C...

2012
Kuan-Wei Wu Chun-Sung Ferng Chia-Hua Ho An-Chun Liang Chun-Heng Huang Wei-Yuan Shen Jyun-Yu Jiang Ming-Hao Yang Ting-Wei Lin Ching-Pei Lee Perng-Hwa Kung Chin-En Wang Ting-Wei Ku Chun-Yen Ho Yi-Shu Tai I-Kuei Chen Wei-Lun Huang Che-Ping Chou Tse-Ju Lin Han-Jay Yang Yen-Kai Wang Cheng-Te Li Shou-De Lin Hsuan-Tien Lin

This paper describes the solution of National Taiwan University for track 2 of KDD Cup 2012. Track 2 of KDD Cup 2012 aims to predict the click-through rate of ads on Tencent proprietary search engine. We exploit classification, regression, ranking, and factorization models to utilize a variety of different signatures captured from the dataset. We then blend our individual models to boost the pe...

2012
S. Songma K. Maichalernnukul

In this paper, a two-phase method for computer network intrusion detection is proposed. In the first phase, a set of patterns (data) are clustered by the fuzzy c-means algorithm. In the second phase, outliers are constructed by a distance-based technique and a class label is assigned to each pattern. The KDD Cup 1999 data set is used for the experiment. The results show that, for binary classif...

Journal: :Scientific Programming 2021

In order to better apply the K-modes algorithm intrusion detection, this paper overcomes problems of existing based on rough set theory. Firstly, for problem clustering in initial class center selection, an selection Ini_Weight weighted density and overlap distance is proposed. Secondly, algorithm, a new WODKM Thirdly, applied detection obtain unsupervised model. The model detects by dividing c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید