International audienceExtracting attributes from network traffic is the first step of network intrusion detection. However, the question of what attributes are most effective for the detection still remains. In this paper, we employed information gain, wrapper with Bayesian Networks (BN) and Decision trees (C4.5) respectively to select key subsets of attributes for network intrusion detection based on KDD Cup 1999 data. We then used the selected 10 attributes to detect DDoS attacks in the real environments. The empirical results based on KDD Cup 1999 data as well as DDoS attack data show that only using the 10 attributes, the detection accuracy almost remains the same or even becomes better compared with that of using all the 41 attributes ...
Abstract: Problem statement: Implementing a single or multiple classifiers that involve a Bayesian N...
International audienceIn this paper, we present a new learning algorithm for anomaly based network i...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceEfficiently processing massive data is a big issue in high-speed network intru...
International audienceDDoS attacks are major threats in current computer networks. However, DDoS att...
Denial of Service Attacks (DoS) is a major threat to computer networks. This paper presents two appr...
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesia...
International audienceIn this paper, a new learning approach for network intrusion detection using n...
Threats of malware, attacks and intrusion have been around since the very conception ofcomputing. Ye...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
Wishing to communicate each other of people contributes to improve technology and it has made the in...
Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection...
Abstract: Problem statement: Implementing a single or multiple classifiers that involve a Bayesian N...
International audienceIn this paper, we present a new learning algorithm for anomaly based network i...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceExtracting attributes from network traffic is the first step of network intrus...
International audienceEfficiently processing massive data is a big issue in high-speed network intru...
International audienceDDoS attacks are major threats in current computer networks. However, DDoS att...
Denial of Service Attacks (DoS) is a major threat to computer networks. This paper presents two appr...
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesia...
International audienceIn this paper, a new learning approach for network intrusion detection using n...
Threats of malware, attacks and intrusion have been around since the very conception ofcomputing. Ye...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
Wishing to communicate each other of people contributes to improve technology and it has made the in...
Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection...
Abstract: Problem statement: Implementing a single or multiple classifiers that involve a Bayesian N...
International audienceIn this paper, we present a new learning algorithm for anomaly based network i...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...