نتایج جستجو برای: kdd99

تعداد نتایج: 84  

Journal: :Expert Syst. Appl. 2014
Tieming Chen Xu Zhang Shichao Jin Okhee Kim

In order to achieve high efficiency of classification in intrusion detection, a compressed model is proposed in this paper which combines horizontal compression with vertical compression. OneR is utilized as horizontal compression for attribute reduction, and affinity propagation is employed as vertical compression to select small representative exemplars from large training data. As to be able...

2007
T. S. Chou K. K. Yen J. Luo

The network traffic data provided for the design of intrusion detection always are large with ineffective information and enclose limited and ambiguous information about users’ activities. We study the problems and propose a two phases approach in our intrusion detection design. In the first phase, we develop a correlation-based feature selection algorithm to remove the worthless information fr...

2016
Mikulás Pataky Damas P. Gruska

Second generation of Multi-agent heterogeneous intrusion detection system (M-AHIDS) is a prototype proposed to detect untrusted and unusual network behaviour. The M-AHIDS is based on online traffic statistics in sFlow format acquired by network device with the sFlow agent and is able to perform a real-time surveillance of the 10 Gb networks. However, after an immense reimplementation it is capa...

Journal: :IEEE transactions on artificial intelligence 2022

Intrusion detection systems (IDS) are amongst the most important automated defense mechanisms in modern industry. It is guarding against many attack vectors, especially healthcare, where sensitive information (patient’s medical history, prescriptions, electronic health records, bills/debts, and other data points) open to compromise from adversaries. In big era, classical machine learning...

Journal: :Asian Journal of Research in Computer Science 2021

The enormous increase in the use of Internet daily life has provided an opportunity for intruder attempt to compromise security principles availability, confidentiality, and integrity. As a result, organizations are working level by using attack detection techniques such as Network Intrusion Detection System (NIDS), which monitors analyzes network flow attacks detection. There lot researches pr...

Journal: : 2021

Digitalization, Industry 4.0 and Internet of things (IoT) have become more popular in the recent years. Most these systems depend on micro-controllers sensors. These sensors are mostly cheap, low RAM CPU systems; thus, they resource constrained environments. In this study, a supervised learning classifier comparison technique suitable for environments is proposed. This technique, Decision Analy...

Journal: :Journal of Big Data 2021

Abstract Machine learning plays an increasingly significant role in the building of Network Intrusion Detection Systems. However, machine models trained with imbalanced cybersecurity data cannot recognize minority data, hence attacks, effectively. One way to address this issue is use resampling, which adjusts ratio between different classes, making more balanced. This research looks at resampli...

Journal: :Mathematical Problems in Engineering 2022

Since there is a close relationship between network information security attack events and time complexity, it necessary to count the degree of correlation current connection record within certain period before. Only in this way can data be better reflected. In paper, rough Fourier fast algorithm based on set theory proposed. Based characteristic attributes intrusion detection with most value c...

Journal: :Sensors 2021

Security in IoT networks is currently mandatory, due to the high amount of data that has be handled. These systems are vulnerable several cybersecurity attacks, which increasing number and sophistication. Due this reason, new intrusion detection techniques have developed, being as accurate possible for these scenarios. Intrusion based on machine learning algorithms already shown a performance t...

Journal: :CoRR 2010
Dewan Md. Farid Nouria Harbi Mohammad Zahidur Rahman

In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید