2011
DOI: 10.5626/jcse.2011.5.4.305
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection: Supervised Machine Learning

Abstract: Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural networks (NN), which leads to a higher detection rate and a lower false alarm rate in a shorter time. This paper focuses on two classification types: a single … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…As presented in Table 3, the KDD Cup 99 dataset contains 22 training attack types. In this paper, mapping of these attack types is performed based on four classes: denial-of-service (DoS), probing, user to root (U2R), and remote to local (R2L) [17]. Specifically speaking, a DoS attack refers to an attack that is performed to prevent the use of service.…”
Section: Data Preprocessingmentioning
confidence: 99%
“…As presented in Table 3, the KDD Cup 99 dataset contains 22 training attack types. In this paper, mapping of these attack types is performed based on four classes: denial-of-service (DoS), probing, user to root (U2R), and remote to local (R2L) [17]. Specifically speaking, a DoS attack refers to an attack that is performed to prevent the use of service.…”
Section: Data Preprocessingmentioning
confidence: 99%
“…Hardware-based ITS utilizes hardware architectures, which are specially designed to prevent certain classes of attacks to maintain crucial services. Hierarchical adaptive control of quality of service for intrusion tolerance architecture includes the diverse replication [3] and networkbased IDS [1], as shown in Fig. 1.…”
Section: A Hardware-based Itsmentioning
confidence: 99%
“…With sophisticated attacks, there are many defendable solutions, such as the detection approach using neural networks [1]. Due to the limitations of the detection approach, a new paradigm is needed.…”
Section: Policy-based Itsmentioning
confidence: 99%
See 1 more Smart Citation
“…Intrusion detection can be considered as a classification problem, so all kinds of algorithms are used to detect the network system, e.g. Neural Network algorithm [1], Bayesian algorithm [2] and other Machine learning algorithms [3].However, All of the above methods need a lot of or complete audit data set to achieve the desired performance, and the training time is long. How to extract the characteristics of audit data in the case of small samples, and realize the intrusion detection?…”
Section: Introductionmentioning
confidence: 99%