The objective of this work is to explore the intrusion detection prob- lem and create simple rules for detecting specific intrusions. The intrusions are explored in the realistic CSE-CIC-IDS2018 dataset. First, the dataset is analyzed by computing appropriate statistics and visualizing the data. In the data visu- alization various dimensionality reduction methods are tested. After analyzing the dataset the data are normalized and prepared for the training. The training process focuses on feature selection and finding the best model for the intrusion detection problem. The feature selection is also used for creating rules. The rules are extracted from an ensemble of Decision Trees. At the end of this work, the rules are compared to the best ...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the deve...
In recent years, network based services and network based attacks have grown significantly. The netw...
Many methods have been developed to secure the network infrastructure and communication over the Int...
Intrusion Detection System (IDS) in computer technology is a little bit different than physical intr...
We examine the effectiveness of rule learning to detect intrusions against privileged programs, usin...
Intrusion Detection Systems (IDS) are implemented over host sonnet work to categorize the activities...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
Computer networks are usually vulnerable to attacks by any unauthorized person trying to misuse the ...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers f...
Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the deve...
In recent years, network based services and network based attacks have grown significantly. The netw...
Many methods have been developed to secure the network infrastructure and communication over the Int...
Intrusion Detection System (IDS) in computer technology is a little bit different than physical intr...
We examine the effectiveness of rule learning to detect intrusions against privileged programs, usin...
Intrusion Detection Systems (IDS) are implemented over host sonnet work to categorize the activities...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
Computer networks are usually vulnerable to attacks by any unauthorized person trying to misuse the ...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers f...
Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the deve...
In recent years, network based services and network based attacks have grown significantly. The netw...