The performance of an IDS is significantly improved when the features are more discriminative and representative. This research effort is able to reduce the CICIDS2017 dataset’s feature dimensions from 81 to 10, while maintaining a high accuracy of 99.6% in multi-class and binary classification. Furthermore, we propose a Multi-Class Combined performance metric CombinedMc with respect to class distribution to compare various multi-class and binary classification systems through incorporating FAR, DR, Accuracy, and class distribution parameters. In addition, we developed a uniform distribution based balancing approach to handle the imbalanced distribution of the minority class instances in the CICIDS 2017 network intrusion dataset
The importance of cyber-security has led to long-standing endeavors dedicated to the design of intru...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
An intrusion detection system's (IDS) key role is to recognise anomalous activities from both inside...
Handling superfluous and insignificant features in high-dimension data sets incidents led to a long-...
Due to the wide variety of network services, many different types of protocols exist, producing vari...
Cyberattacks have increased in tandem with the exponential expansion of computer networks and networ...
Over the past few years, intrusion protection systems have drawn a mature research area in the field...
The growth in internet traffic volume presents a new issue in anomaly detection, one of which is the...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
This research presents an IDS prototype in Matlab that assess network traffic connections contained ...
A network intrusion detection system (NIDS) is one important element to mitigate cybersecurity risks...
As the internet size grows rapidly so that the attacks on network. There is a need of intrusion dete...
Intrusion Detection Systems (IDSs) monitor network traffic and system activities to identify any una...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...
In cybersecurity, machine/deep learning approaches can predict and detect threats before they result...
The importance of cyber-security has led to long-standing endeavors dedicated to the design of intru...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
An intrusion detection system's (IDS) key role is to recognise anomalous activities from both inside...
Handling superfluous and insignificant features in high-dimension data sets incidents led to a long-...
Due to the wide variety of network services, many different types of protocols exist, producing vari...
Cyberattacks have increased in tandem with the exponential expansion of computer networks and networ...
Over the past few years, intrusion protection systems have drawn a mature research area in the field...
The growth in internet traffic volume presents a new issue in anomaly detection, one of which is the...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
This research presents an IDS prototype in Matlab that assess network traffic connections contained ...
A network intrusion detection system (NIDS) is one important element to mitigate cybersecurity risks...
As the internet size grows rapidly so that the attacks on network. There is a need of intrusion dete...
Intrusion Detection Systems (IDSs) monitor network traffic and system activities to identify any una...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...
In cybersecurity, machine/deep learning approaches can predict and detect threats before they result...
The importance of cyber-security has led to long-standing endeavors dedicated to the design of intru...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
An intrusion detection system's (IDS) key role is to recognise anomalous activities from both inside...