2015
DOI: 10.14257/ijunesst.2015.8.3.28
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Support Vector Machines and Clustering of Intrusion Detection System for Computer Networks

Abstract: Considering that intrusion detection systems and anomaly clearly recognize malicious activity. Nowadays, data mining based intrusion detection systems, security and more rapidly detect attacks.Therefore,in this article we use a combination of k-means clustering algorithm and is used supervised support vector machine algorithm to find the best line separator. This is leading to the separation of normal and attack traffic.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…This trend will cause some repetitive and unnecessary features, which delay detection process, to be ignored. In this regard, adoption of an effective algorithm in feature selection is of great importance [2,3]. Several methods have been introduced in recent years to present an appropriate intrusion detection emphasizing feature selection.…”
Section: Introductionmentioning
confidence: 99%
“…This trend will cause some repetitive and unnecessary features, which delay detection process, to be ignored. In this regard, adoption of an effective algorithm in feature selection is of great importance [2,3]. Several methods have been introduced in recent years to present an appropriate intrusion detection emphasizing feature selection.…”
Section: Introductionmentioning
confidence: 99%