International audienceExtracting attributes from network traffic is the first step of network intrusion detection. However, the question of which or what attributes are most effective for the detection still remains. In this paper, we employed information gain, wrapper with Bayesian Networks (BN) and Decision trees (C4.5) respectively to select key subsets of attributes for network intrusion detection based on KDD Cup 1999 data. We then used the selected 10 attributes to detect DDoS attacks in the real environments. The empirical results based on DDoS attack data collected in the real world as well as KDD Cup 1999 data show that only using the 10 attributes, the detection accuracy almost remains the same or even becomes better compared with...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
Computer Network Security has become a critical and important issue due to ever increasing cyber-cri...
Distributed Denial of Service (DDoS) attacks have been the prominent attacks over the last decade. A...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceDDoS attacks are major threats in current computer networks. However, DDoS att...
International audienceEfficiently processing massive data is a big issue in high-speed network intru...
Denial of Service Attacks (DoS) is a major threat to computer networks. This paper presents two appr...
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesia...
International audienceIn this paper, a new learning approach for network intrusion detection using n...
Threats of malware, attacks and intrusion have been around since the very conception ofcomputing. Ye...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
Wishing to communicate each other of people contributes to improve technology and it has made the in...
Abstract: Problem statement: Implementing a single or multiple classifiers that involve a Bayesian N...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
Computer Network Security has become a critical and important issue due to ever increasing cyber-cri...
Distributed Denial of Service (DDoS) attacks have been the prominent attacks over the last decade. A...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceDDoS attacks are major threats in current computer networks. However, DDoS att...
International audienceEfficiently processing massive data is a big issue in high-speed network intru...
Denial of Service Attacks (DoS) is a major threat to computer networks. This paper presents two appr...
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesia...
International audienceIn this paper, a new learning approach for network intrusion detection using n...
Threats of malware, attacks and intrusion have been around since the very conception ofcomputing. Ye...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
Wishing to communicate each other of people contributes to improve technology and it has made the in...
Abstract: Problem statement: Implementing a single or multiple classifiers that involve a Bayesian N...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
Computer Network Security has become a critical and important issue due to ever increasing cyber-cri...
Distributed Denial of Service (DDoS) attacks have been the prominent attacks over the last decade. A...