In today’s world, Intrusion Detection System (IDS) is one of the significant tools used to the improvement of network security, by detecting attacks or abnormal data accesses. Most of existing IDS have many disadvantages such as high false alarm rates and low detection rates. For the IDS, dealing with distributed and massive data constitutes a challenge. Besides, dealing with imprecise data is another challenge. This paper proposes an Intrusion Detection System based on big data fuzzy analytics; Fuzzy C-Means (FCM) method is used to cluster and classify the pre-processed training dataset. The CTU-13 and the UNSW-NB15 are used as distributed and massive datasets to prove the feasibility of the method. The proposed system shows high performan...
In this paper, considering that the serious network security situation we are facing and the problem...
With the rapid rise of technology, many unusual and unwanted patterns have been observed in the comm...
(IDS), is being used as the main security defending technique. It is second guard for a network afte...
Intrusion detection plays an important role in today’s computer and communication technology. As suc...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
Strong network connections make the risk of malicious activities emerge faster while dealing with bi...
Intrusion Detection Systems (IDS) is special software developed in order to protect the system again...
Cybersecurity is seen as a major player in the protection of Internet-connected systems, including h...
Currently, with the rapid developments communication technologies, large number of trustworthy onlin...
AbstractA common problem shared by current IDS is the high false positives and low detection rate. A...
In spite of growing information system widely, security has remained one hard-hitting area for compu...
In recent years, the overwhelming networking data has been growing at an exponential rate. Not only ...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
In this paper, considering that the serious network security situation we are facing and the problem...
With the rapid rise of technology, many unusual and unwanted patterns have been observed in the comm...
(IDS), is being used as the main security defending technique. It is second guard for a network afte...
Intrusion detection plays an important role in today’s computer and communication technology. As suc...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
Strong network connections make the risk of malicious activities emerge faster while dealing with bi...
Intrusion Detection Systems (IDS) is special software developed in order to protect the system again...
Cybersecurity is seen as a major player in the protection of Internet-connected systems, including h...
Currently, with the rapid developments communication technologies, large number of trustworthy onlin...
AbstractA common problem shared by current IDS is the high false positives and low detection rate. A...
In spite of growing information system widely, security has remained one hard-hitting area for compu...
In recent years, the overwhelming networking data has been growing at an exponential rate. Not only ...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
In this paper, considering that the serious network security situation we are facing and the problem...
With the rapid rise of technology, many unusual and unwanted patterns have been observed in the comm...
(IDS), is being used as the main security defending technique. It is second guard for a network afte...