A novel approach is presented that bridges the gap between anomaly and misuse detection for identifying cyber attacks. The approach consists of an ensemble of classifiers that, together, produce a more informative output regarding the class of attack than any of the classifiers alone. Each classifier classifies based on a limited subset of possible features of network packets. The ensemble classifies based on the union of the subsets of features. Thus it can detect a wider range of attacks. In addition, the ensemble can determine the probability of the type of attack based on the results of the classifiers. Experimental results demonstrate an increase in the rate of detecting attacks as well as accurately determining their type
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily...
The public network access to smart grids has a great impact on the system‘s safe operation. With the...
Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the de...
Since the early days of research on Intrusion Detection, anomaly-based approaches have been proposed...
Due to the extensive use of computer networks, new risks have arisen, and improving the speed and ac...
As it is well known, some Intrusion Detection Systems (IDSs) suffer from high rates of false positiv...
The widespread use of the Internet has an adverse effect of being vulnerable to cyber attacks. Defen...
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of det...
Security analysts have to deal with a large volume of network traffic to identify and prevent cyber ...
Background: Building an effective Intrusion detection system in a multi-attack classification enviro...
In last decades there have been many proposals from the machine learning community in the intrusion ...
The proliferation of interconnected battlefield information-sharing devices, known as the Internet o...
Intrusion Detection Systems (IDSs) play an essential role in today’s network security infrastructure...
The demand for application of technology in almost all walks of life is in the increase and can be s...
Cyber-attack classification and detection process is based on the fact that intrusive activities are...
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily...
The public network access to smart grids has a great impact on the system‘s safe operation. With the...
Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the de...
Since the early days of research on Intrusion Detection, anomaly-based approaches have been proposed...
Due to the extensive use of computer networks, new risks have arisen, and improving the speed and ac...
As it is well known, some Intrusion Detection Systems (IDSs) suffer from high rates of false positiv...
The widespread use of the Internet has an adverse effect of being vulnerable to cyber attacks. Defen...
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of det...
Security analysts have to deal with a large volume of network traffic to identify and prevent cyber ...
Background: Building an effective Intrusion detection system in a multi-attack classification enviro...
In last decades there have been many proposals from the machine learning community in the intrusion ...
The proliferation of interconnected battlefield information-sharing devices, known as the Internet o...
Intrusion Detection Systems (IDSs) play an essential role in today’s network security infrastructure...
The demand for application of technology in almost all walks of life is in the increase and can be s...
Cyber-attack classification and detection process is based on the fact that intrusive activities are...
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily...
The public network access to smart grids has a great impact on the system‘s safe operation. With the...
Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the de...