In this work, a new method for classification is proposed consisting of a combination of feature selection, normalization, fuzzy C means clustering algorithm and C4.5 decision tree algorithm. The aim of this method is to improve the performance of the classifier by using selected features. The fuzzy C means clustering method is used to partition the training instances into clusters. On each cluster, we build a decision tree using C4.5 algorithm. Experiments on the KDD CUP 99 data set shows that our proposed method in detecting intrusion achieves better performance while reducing the relevant features by more than 80%
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
With the evident need for accuracy in the performance of intrusion detection system, it is expedient...
In this work, a new method for classification is proposed consisting of a combination of feature sel...
With the growing rate of interconnections among computer systems, reliablenetwork communication is b...
Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
Due to increase in intrusion activities over internet, many intrusion detection systems are proposed...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
Rule Based Detection Systems have been successful in preventing attacks on network resources, but su...
Rule Based Detection Systems have been successful in preventing attacks on network resources, but su...
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the c...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
With the evident need for accuracy in the performance of intrusion detection system, it is expedient...
In this work, a new method for classification is proposed consisting of a combination of feature sel...
With the growing rate of interconnections among computer systems, reliablenetwork communication is b...
Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as p...
Due to increase in intrusion activities over internet, many intrusion detection systems are proposed...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
Rule Based Detection Systems have been successful in preventing attacks on network resources, but su...
Rule Based Detection Systems have been successful in preventing attacks on network resources, but su...
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the c...
AbstractIntrusions pose a serious securing risk in a network environment. Network intrusion detectio...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
Abstract:- The goal of intrusion detection is to discover unauthorized use of computer systems. New ...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
With the evident need for accuracy in the performance of intrusion detection system, it is expedient...