Tesfahun et al., 2013 - Google Patents
Intrusion detection using random forests classifier with SMOTE and feature reductionTesfahun et al., 2013
View PDF- Document ID
- 9411560670677124854
- Author
- Tesfahun A
- Bhaskari D
- Publication year
- Publication venue
- 2013 International conference on cloud & ubiquitous computing & emerging technologies
External Links
Snippet
Intrusion Detection Systems (IDS) have become crucial components in computer and network security. NSL-KDD intrusion detection dataset which is an enhanced version of KDDCUP'99 dataset was used as the experiment dataset in this paper. Because of inherent …
- 238000001514 detection method 0 title abstract description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tesfahun et al. | Intrusion detection using random forests classifier with SMOTE and feature reduction | |
Shone et al. | A deep learning approach to network intrusion detection | |
Osanaiye et al. | Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing | |
Panda et al. | A hybrid intelligent approach for network intrusion detection | |
Ektefa et al. | Intrusion detection using data mining techniques | |
Kaushik | Unleashing the power of multi-agent deep learning: Cyber-attack detection in IoT | |
Yuan et al. | Two layers multi-class detection method for network intrusion detection system | |
Pattawaro et al. | Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique | |
Masarat et al. | A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems | |
Raihan-Al-Masud et al. | Network intrusion detection system using voting ensemble machine learning | |
Sharma et al. | Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic | |
Saheed et al. | An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system | |
Iqbal et al. | A classification framework to detect DoS attacks | |
Osanaiye et al. | Analysing feature selection and classification techniques for DDoS detection in cloud | |
Harbola et al. | Improved intrusion detection in DDoS applying feature selection using rank & score of attributes in KDD-99 data set | |
Thanh et al. | An approach to reduce data dimension in building effective network intrusion detection systems | |
Samantaray et al. | A comparative assessment of machine learning algorithms in the IoT-based network intrusion detection systems | |
Uzun et al. | Performance evaluation of machine learning algorithms for detecting abnormal data traffic in computer networks | |
Dhahir | A Hybrid Approach for Efficient DDoS Detection in Network Traffic Using CBLOF-Based Feature Engineering and XGBoost | |
Firmansyah et al. | Evaluation of naive bayes, random forest and stochastic gradient boosting algorithm on ddos attack detection | |
Shorfuzzaman | Detection of cyber attacks in IoT using tree-based ensemble and feedforward neural network | |
Song et al. | Reconstructing classification to enhance machine-learning based network intrusion detection by embracing ambiguity | |
Patel et al. | Novel attribute selection technique for an efficient intrusion detection system | |
Musthafa et al. | Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques | |
Alhazzaa et al. | Intrusion Detection Systems using Genetic Algorithms |