A pattern matching method (signature-based) is widely used in basic network intrusion detection systems (IDS). A more robust method is to use a machine learning classifier to detect anomalies and unseen attacks. However, a single machine learning classifier is unlikely to be able to accurately detect all types of attacks, especially uncommon attacks e.g., Remote2Local (R2L) and User2Root (U2R) due to a large difference in the patterns of attacks. Thus, a hybrid approach offers more promising performance. In this paper, we proposed a Double-Layered Hybrid Approach (DLHA) designed specifically to address the aforementioned problem. We studied common characteristics of different attack categories by creating Principal Component Analysis (PCA) ...
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS...
Network intrusion detection systems (NIDSs) play an important role in computer network security. The...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
AbstractDue to the tremendous growth of network based services, intrusion detection has emerged as a...
Traditional intrusion detection systems uses either anomaly based or signature based technique. Both...
With the growing rate of cyber-attacks , there is a significant need for intrusion detection system...
Abstract The internet has grown enormously for many years. It is not just connecting computer networ...
The increase of security threats and hacking the computer networks are one of the most dangerous i...
Abstract—Although there are different techniques proposed for intrusion detection in the literature,...
In this study, a hybrid and layered Intrusion Detection System (IDS) is proposed that uses a combina...
Now day’s security is the primary concerned inthe field of computer science.With quickly growingunau...
© 2009 Dr. Kapil Kumar GuptaIntrusion Detection systems are now an essential component in the overal...
With the growth of networked computers and associated applications, intrusion detection has become e...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
In current day information transmitted from one place to another by using network communication tech...
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS...
Network intrusion detection systems (NIDSs) play an important role in computer network security. The...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
AbstractDue to the tremendous growth of network based services, intrusion detection has emerged as a...
Traditional intrusion detection systems uses either anomaly based or signature based technique. Both...
With the growing rate of cyber-attacks , there is a significant need for intrusion detection system...
Abstract The internet has grown enormously for many years. It is not just connecting computer networ...
The increase of security threats and hacking the computer networks are one of the most dangerous i...
Abstract—Although there are different techniques proposed for intrusion detection in the literature,...
In this study, a hybrid and layered Intrusion Detection System (IDS) is proposed that uses a combina...
Now day’s security is the primary concerned inthe field of computer science.With quickly growingunau...
© 2009 Dr. Kapil Kumar GuptaIntrusion Detection systems are now an essential component in the overal...
With the growth of networked computers and associated applications, intrusion detection has become e...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
In current day information transmitted from one place to another by using network communication tech...
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS...
Network intrusion detection systems (NIDSs) play an important role in computer network security. The...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...