نتایج جستجو برای: پایگاه داده nsl kdd

تعداد نتایج: 219169  

2017
Jorge Luis Rivero Pérez Bernardete Ribeiro Ning Chen Fatima Silva Leite

One of the main problems in Network Intrusion Detection comes from constant rise of new attacks, so that not enough labeled examples are available for the new classes of attacks. Traditional Machine Learning approaches hardly address such problem. This can be overcome with Zero-Shot Learning, a new approach in the field of Computer Vision, which can be described in two stages: the Attribute Lea...

2015
Manish Verma Sanjay Kumar Jena

Nowadays, the massive increment in applications running on a computer and excessive in network services forces to take convenient security policies into an account. Many methods of intrusion detection proposed to provide security in a computer system and network using data mining methods. These methods comprise of the outlier, unsupervised and supervised methods. As we know, each data mining me...

2010
Mostafa A. Salama Heba F. Eid Rabie A. Ramadan Ashraf Darwish Aboul Ella Hassanien

This paper introduces a hybrid scheme that combines the advantages of deep belief network and support vector machine. An application of intrusion detection imaging has been chosen and hybridization scheme have been applied to see their ability and accuracy to classify the intrusion into two outcomes: normal or attack, and the attacks fall into four classes; R2L, DoS, U2R, and Probing. First, we...

2012
R. Najafi Mohsen Afsharchi

Computer networks are nowadays subject to an increasing number of attacks. Intrusion Detection Systems (IDS) are designed to protect them by identifying malicious behaviors or improper uses. Since the scope is different in each case (register already-known menaces to later recognize them or model legitimate uses to trigger when a variation is detected), IDS have failed so far to respond against...

2015
Tamer F. Ghanem Wail S. Elkilani Hatem S. Ahmed Mohiy M. Hadhoud

During the last decade, Intrusion Detection Systems (IDSs) have played an important role in defending critical computer systems and networks from cyber-attacks. Anomaly detection techniques have received a particularly great amount of attention because they offer intrinsic ability to detect unknown attacks. In this paper, we propose an enhanced hybrid anomaly detection approach based on negativ...

2015
Meesala Shobha Rani Basil Xavier

Cyber security threats have become increasingly sophisticated and complex. Intrusion detection which is one of the main problems in computer security has the main goal to detect infrequent access or attacks and to protect internal networks. A new hybrid intrusion detection method combining multiple classifiers for classifying anomalous and normal activities in the computer network is presented....

2012
G. Kalyani Jaya Lakshmi

Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing the events occurring in a computer system in order to detect different security violations. The aim of this paper is to classify activities of a system into two major categories: normal and abnormal activities. In this paper we present the comparison of different classifi...

2017
Mohamed Idhammad Karim Afdel Mustapha Belouch

DoS attack tools have become increasingly sophisticated challenging the existing detection systems to continually improve their performances. In this paper we present a victimend DoS detection method based on Artificial Neural Networks (ANN). In the proposed method a Feed-forward Neural Network (FNN) is optimized to accurately detect DoS attack with minimum resources usage. The proposed method ...

2013
Heba F. Eid Aboul Ella Hassanien Tai-hoon Kim Soumya Banerjee

Feature selection is a preprocessing phase to machine learning, which leads to increase the classification accuracy and reduce its complexity. However, the increase of data dimensionality poses a challenge to many existing feature selection methods. This paper formulates and validates a method for selecting optimal feature subset based on the analysis of the Pearson correlation coefficients. We...

2015
Ashalata Panigrahi Manas Ranjan Patra

With the increase in Internet users the number of malicious users are also growing day-by-day posing a serious problem in distinguishing between normal and abnormal behavior of users in the network. This has led to the research area of intrusion detection which essentially analyzes the network traffic and tries to determine normal and abnormal patterns of behavior.In this paper, we have analyze...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید