In this paper, to optimize the process of detecting cyber-attacks, we choose to propose 2 main optimization solutions: Optimizing the detection method and optimizing features. Both of these two optimization solutions are to ensure the aim is to increase accuracy and reduce the time for analysis and detection. Accordingly, for the detection method, we recommend using the Random Forest supervised classification algorithm. The experimental results in section 4.1 have proven that our proposal that use the Random Forest algorithm for abnormal behavior detection is completely correct because the results of this algorithm are much better than some other detection algorithms on all measures. For the feature optimization solution, we propose to use ...
Network attacks in network traffic are vital and well known problems which can subdue the basic secu...
In various networks, anomaly may happen due to network breakdown, intrusion detection, and end-to-en...
In current decades, the size and complexity of network traffic data have risen significantly, which ...
In this paper, to optimize the process of detecting cyber-attacks, we choose to propose 2 main optim...
The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vuln...
Cybersecurity is one of the great challenges of today’s world. Rapid technological development has a...
Due to the advance in network technologies, the number of network users is growing rapidly, which le...
With the massive growth of computer networks and the enormous increase in the number of applications...
Nowadays the network security is a crucial issue and traditional intrusion detection systems are not...
AbstractIntrusion detection system plays an important role in network security. Intrusion detection ...
The main problem associated with the development of an effective network behaviour anomaly detection...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The rapid growth of the data-communications network for real-world commercial applications requires ...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Network attacks in network traffic are vital and well known problems which can subdue the basic secu...
In various networks, anomaly may happen due to network breakdown, intrusion detection, and end-to-en...
In current decades, the size and complexity of network traffic data have risen significantly, which ...
In this paper, to optimize the process of detecting cyber-attacks, we choose to propose 2 main optim...
The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vuln...
Cybersecurity is one of the great challenges of today’s world. Rapid technological development has a...
Due to the advance in network technologies, the number of network users is growing rapidly, which le...
With the massive growth of computer networks and the enormous increase in the number of applications...
Nowadays the network security is a crucial issue and traditional intrusion detection systems are not...
AbstractIntrusion detection system plays an important role in network security. Intrusion detection ...
The main problem associated with the development of an effective network behaviour anomaly detection...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The rapid growth of the data-communications network for real-world commercial applications requires ...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Network attacks in network traffic are vital and well known problems which can subdue the basic secu...
In various networks, anomaly may happen due to network breakdown, intrusion detection, and end-to-en...
In current decades, the size and complexity of network traffic data have risen significantly, which ...