نتایج جستجو برای: kdd cup 99

تعداد نتایج: 84698  

2013
Ruchi Jain Nasser S. Abouzakhar

This paper aims to analyse the performance of Hidden Markov Model (HMM) and Support Vector Machine (SVM) for anomaly intrusion detection. These techniques discriminate between normal and abnormal behaviour of network traffic. The specific focus of this study is to investigate and identify distinguishable TCP services that comprise of both normal and abnormal types of TCP packets, using J48 deci...

Journal: :Production Systems and Information Engineering 2019

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

2007
S. Selvakani R. S. Rajesh

With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. The detection of attacks against computer networks is becoming a harder problem to solve in the field of Network security. Intrusion Detection is an essential mechanism to protect computer systems from many attacks. As the transmission of data over the internet increas...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

<span>IoT networks mostly rely on wireless mediums for communication, and due to that, they are very susceptible intrusions. And the tiny nature, processing complexity, limited storage capacities, IoT require reliable intrusion detection systems (IDS). Although there many IDS types of research available in literature, most these suitable wired network environments, benchmark datasets used...

Journal: :I. J. Network Security 2012
Radhika Goel Anjali Sardana Ramesh Chandra Joshi

In this paper a novel hybrid model is being proposed for misuse and anomaly detection. C4.5 based binary decision trees are used for misuse and CBA (Classification Based Association) based classifier is used for anomaly detection. Firstly, the C4.5 based decision tree separates the network traffic into normal and attack categories. The normal traffic is sent to anomaly detector and parallel att...

2012
Sanjay Kumar Sharma Pankaj Pandey M. S. Sisodia

As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attenti...

2008
Claudia Perlich Prem Melville Yan Liu Grzegorz Świrszcz Richard Lawrence Saharon Rosset

We describe the ideas and methodologies that we developed in addressing the KDD Cup 2008 on early breast cancer detection, and discuss how they contributed to our success. 1. TASK AND DATA DESCRIPTION The Siemens KDD Cup 2008 comprised two prediction tasks in breast cancer detection from images. The organizers provided data from 1712 patients for training; of these 118 had cancer. Within the fo...

2015
Vidhya N. Gavali Sunil Sangve

the Intrusion Detection System (IDS) is tool which detects an unauthorised, misuse of computer system and provides information security. An intrusion detection system (IDS) is combined with hardware and software elements that work together to find unexpected events which may indicate an attack will happen, is happening, or has happened. Network intrusion detection based on anomaly detection pro...

Journal: :IEEE Transactions on Cloud Computing 2022

Security issues have resulted in severe damage to the cloud computing environment, adversely affecting healthy and sustainable development of computing. Intrusion detection is one technologies for protecting environment from malicious attacks. However, network traffic characterized by large scale, high dimensionality, redundancy, these characteristics pose serious challenges intrusion systems. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید