© 2017 IEEE. This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic related statistics in order to provide distinguishing features for detection. The proposed IDS was evaluated using the well-known KDD Cup 99 data set. Evaluation results show that the proposed system achieved better detection rates on KDD Cup 99 data set in comparison with another two state-of-the-art detection schemes. Moreover, the computational complexity of the system has been analysed in this paper and shows similar to the two state-of-the-art schemes
Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based ...
To avoid high computational costs inidentifying intrusions by IDSs, the size of adataset needs to be...
In this paper, a framework for recognizing network traffic in order to detect anomalies is proposed....
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network...
The popularity of the Internet supplies attackers with a new means to violate any organizations and ...
By performing network traffic analyzing in different datasets, Intrusion Detection Systems (IDS) tha...
Cyber crimes and malicious network activities have posed serious threats to the entire internet and ...
Abstract: Cyber crimes and malicious network activities have posed serious threats to the entire int...
Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have dev...
Abstract:Over last few decades design of Network Intrusion Detection System (NIDS) has been a challe...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Handling superfluous and insignificant features in high-dimension data sets incidents led to a long-...
The network traffic data provided for the design of intrusion detection always are large with ineffe...
Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based ...
To avoid high computational costs inidentifying intrusions by IDSs, the size of adataset needs to be...
In this paper, a framework for recognizing network traffic in order to detect anomalies is proposed....
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network...
The popularity of the Internet supplies attackers with a new means to violate any organizations and ...
By performing network traffic analyzing in different datasets, Intrusion Detection Systems (IDS) tha...
Cyber crimes and malicious network activities have posed serious threats to the entire internet and ...
Abstract: Cyber crimes and malicious network activities have posed serious threats to the entire int...
Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have dev...
Abstract:Over last few decades design of Network Intrusion Detection System (NIDS) has been a challe...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Handling superfluous and insignificant features in high-dimension data sets incidents led to a long-...
The network traffic data provided for the design of intrusion detection always are large with ineffe...
Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based ...
To avoid high computational costs inidentifying intrusions by IDSs, the size of adataset needs to be...
In this paper, a framework for recognizing network traffic in order to detect anomalies is proposed....