نتایج جستجو برای: kdd cup 99

تعداد نتایج: 84698  

Journal: :International Journal of Computer Applications 2019

Journal: :journal of advances in computer research 2013
yazdan jamshidi hossein nezamabadi-pour

as networking and communication technology becomes more widespread, thequantity and impact of system attackers have been increased rapidly. themethodology of intrusion detection (ids) is generally classified into two broadcategories according to the detection approaches: misuse detection and anomalydetection. in misuse detection approach, abnormal system behavior is defined atfirst, and then an...

2013
Mohammad Khubeb Siddiqui

The KDD Cup 99 dataset has been the point of attraction for many researchers in the field of intrusion detection from the last decade. Many researchers have contributed their efforts to analyze the dataset by different techniques. Analysis can be used in any type of industry that produces and consumes data, of course that includes security. This paper is an analysis of 10% of KDD cup’99 trainin...

Journal: :International Journal of Database Theory and Application 2013

2003
Yacine Bouzida Frédéric Cuppens Nora Cuppens-Boulahia Sylvain Gombault

Most current intrusion detection systems are signature based ones or machine learning based methods. Despite the number of machine learning algorithms applied to KDD 99 cup, none of them have introduced a pre-model to reduce the huge information quantity present in the different KDD 99 datasets. We introduce a method that applies to the different datasets before performing any of the different ...

Journal: :International Journal of Network Security & Its Applications 2019

2004
Yacine Bouzida Sylvain Gombault

Most current intrusion detection systems are signature based ones or machine learning based methods. Despite the number of machine learning algorithms applied to KDD 99 cup, none of them have introduced a pre-model to reduce the huge information quantity present in the different KDD 99 datasets. We introduce a method that applies to the different datasets before performing any of the different ...

2016
Anurag Jain J. L. Rana Rajiv Gandhi

Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques and algorithms have been discussed for anomaly detection. In the most of cases true positive and false positive parameters have been used to compare their performance. However, depending upon the application a wrong true positive or wrong false positive may have severe detrimental effects. This ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید