Nothing Special   »   [go: up one dir, main page]

Tesfahun et al., 2013 - Google Patents

Intrusion detection using random forests classifier with SMOTE and feature reduction

Tesfahun et al., 2013

View PDF
Document ID
9411560670677124854
Author
Tesfahun A
Bhaskari D
Publication year
Publication venue
2013 International conference on cloud & ubiquitous computing & emerging technologies

External Links

Snippet

Intrusion Detection Systems (IDS) have become crucial components in computer and network security. NSL-KDD intrusion detection dataset which is an enhanced version of KDDCUP'99 dataset was used as the experiment dataset in this paper. Because of inherent …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection

Similar Documents

Publication Publication Date Title
Tesfahun et al. Intrusion detection using random forests classifier with SMOTE and feature reduction
Shone et al. A deep learning approach to network intrusion detection
Osanaiye et al. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
Panda et al. A hybrid intelligent approach for network intrusion detection
Ektefa et al. Intrusion detection using data mining techniques
Kaushik Unleashing the power of multi-agent deep learning: Cyber-attack detection in IoT
Yuan et al. Two layers multi-class detection method for network intrusion detection system
Pattawaro et al. Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique
Masarat et al. A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems
Raihan-Al-Masud et al. Network intrusion detection system using voting ensemble machine learning
Sharma et al. Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic
Saheed et al. An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system
Iqbal et al. A classification framework to detect DoS attacks
Osanaiye et al. Analysing feature selection and classification techniques for DDoS detection in cloud
Harbola et al. Improved intrusion detection in DDoS applying feature selection using rank & score of attributes in KDD-99 data set
Thanh et al. An approach to reduce data dimension in building effective network intrusion detection systems
Samantaray et al. A comparative assessment of machine learning algorithms in the IoT-based network intrusion detection systems
Uzun et al. Performance evaluation of machine learning algorithms for detecting abnormal data traffic in computer networks
Dhahir A Hybrid Approach for Efficient DDoS Detection in Network Traffic Using CBLOF-Based Feature Engineering and XGBoost
Firmansyah et al. Evaluation of naive bayes, random forest and stochastic gradient boosting algorithm on ddos attack detection
Shorfuzzaman Detection of cyber attacks in IoT using tree-based ensemble and feedforward neural network
Song et al. Reconstructing classification to enhance machine-learning based network intrusion detection by embracing ambiguity
Patel et al. Novel attribute selection technique for an efficient intrusion detection system
Musthafa et al. Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques
Alhazzaa et al. Intrusion Detection Systems using Genetic Algorithms