نتایج جستجو برای: پایگاه داده NSL-KDD
تعداد نتایج: 219169 فیلتر نتایج به سال:
سیستمهای تشخیص نفوذ برای ایجاد امنیت در شبکههای کامپیوتری پیشنهاد شدهاند تا در صورتی که نفوذگر از سایر تجهیزات امنیتی عبور کرد، بتواند آن را تشخیص داده و از پیشروی آن جلوگیری کند. یکی از مهمترین چالشهای این سیستمها، ابعاد بالای دادههای آن میباشد. در این تحقیق برای کاهش ابعاد دادهای از یک الگوریتم ژنتیک ساده با طول رشته متغیر استفاده میکنیم. در مرحله بعد با توجه به ویژگیهای انتخاب شده...
The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with numerous features. As a result, in order to get rid of this problem, several types of intrusion detection methods with different levels of accuracy have been proposed which leads the choice of an effective and robust method for...
In the field of internet, network based application plays a vital role, where data transfers mostly in digital forms in various formats from source to destinations. In this digital exchange of information there are several possibilities of attacks and vulnerabilities. Intrusion detection systems are widely used to protect networks. An efficient detection of intrusion from network data set is a ...
This paper applies discriminative multinomial Naïve Bayes with various filtering analysis in order to build a network intrusion detection system. For our experimental analysis, we used the new NSL-KDD dataset, which is considered as a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. We perform 2 class classifications with 10-fold cross validation for building our proposed...
Data Mining is a technique to drilling the database for giving meaning to the approachable data. It involves systematic analysis of large data sets. And the classification is used to manage data, sometimes tree modeling of data helps to make predictions about new data. Recently, we have increasing in the number of cyber-attacks, detecting the intrusion in networks become a very tough job. In Ne...
Deep learning based intrusion detection cyber security methods gained increased popularity. The essential element to provide protection the ICT infrastructure is systems (IDSs). Intelligent solutions are necessary control complexity and increase in new attack types. intelligent system (DL/ML) has been widely used with its benefits effectively deal complex great dimensional data. IDS various typ...
An Intrusion detection system (IDS) is a device or a software application that monitors a network or systems for malicious activity or policy violations. Intrusion Detection Systems supports to discover, determine, and identify unauthorized use, duplication, alteration, and destruction of information systems. So, to make intrusion detection system more efficient, the techniques that are more ad...
With the expansion of computer network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper we propose an intrusion detection system that uses rough set theory for feature selection, which is extraction of relevan...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید