Handling superfluous and insignificant features in high-dimension data sets incidents led to a long-term demand for system anomaly detection. Ignoring such elements with spectral instruction not speeds up the analysis process but again facilitates classifiers to make accurate selections during attack perception stage, when wrestling with huge-scale and heterogeneous data. In this paper, for dimensionality reduction of data, we use Correlation-based Feature Selection (CFS) and Naïve Bayes (NB) classifier techniques. The proposed Intrusion Detection System (IDS) classifies attacks using a Multilayer Perceptron (MLP) and Instance-Based Learning algorithm (IBK). The accuracy of the introduced IDS is 99.87% and 99.82% with only 5 and 3 features ...
In the last decade, the number of attacks on the internet has grown significantly, and the types of ...
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks ...
This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (IS...
Cyberattacks have increased in tandem with the exponential expansion of computer networks and networ...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
This research presents an IDS prototype in Matlab that assess network traffic connections contained ...
Over the past few years, intrusion protection systems have drawn a mature research area in the field...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
The performance of an IDS is significantly improved when the features are more discriminative and re...
AbstractIntrusion detection is the process of monitoring and analyzing the events occurring in a com...
Due to the wide variety of network services, many different types of protocols exist, producing vari...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
In the last decade, the number of attacks on the internet has grown significantly, and the types of ...
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks ...
This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (IS...
Cyberattacks have increased in tandem with the exponential expansion of computer networks and networ...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
This research presents an IDS prototype in Matlab that assess network traffic connections contained ...
Over the past few years, intrusion protection systems have drawn a mature research area in the field...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
The performance of an IDS is significantly improved when the features are more discriminative and re...
AbstractIntrusion detection is the process of monitoring and analyzing the events occurring in a com...
Due to the wide variety of network services, many different types of protocols exist, producing vari...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
In the last decade, the number of attacks on the internet has grown significantly, and the types of ...
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks ...
This article consolidates analysis of established (NSL-KDD) and new intrusion detection datasets (IS...