Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based on data features. Using all features for classification consumes more computation time and computer resources. Some of these features may be redundant and irrelevant therefore, they affect the detection of traffic anomalies and the overall performance of the IDS. The literature proposed different algorithms and techniques to define the most relevant sets of features of KDD cup 1999 that can achieve high detection accuracy and maintain the same performance as the total data features. However, all these algorithms and techniques did not produce optimal solutions even when they utilized same datasets. In this paper, a new approach is proposed to...
An intrusion detection system’s (IDS) key role is to recognise anomalous activities from both inside...
Now in these days due to rapidly increasing network applications the data and privacy security in ne...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...
Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based ...
Abstract: At present, network security needs to be concerned to provide secure information channels ...
Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques...
A network data set may contain a huge amount of data and processing this huge amount of data is one ...
AbstractThe KDD data set is a well known benchmark in the research of Intrusion Detection techniques...
Intrusion Detection System (IDS) use models as a basis for detecting intrusions. To ensure that thes...
Nowadays it is imperative to maintain a high level of security to ensure secure communication of inf...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Abstract — Internet and internet users are increasing day by day. Also due to rapid development of i...
Abstract — There is wide use of internet for data exchange and increasing rapidly in almost all the ...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
An intrusion detection system’s (IDS) key role is to recognise anomalous activities from both inside...
Now in these days due to rapidly increasing network applications the data and privacy security in ne...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...
Detection accuracy of Intrusion Detection System (IDS) depends on classifying network traffic based ...
Abstract: At present, network security needs to be concerned to provide secure information channels ...
Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques...
A network data set may contain a huge amount of data and processing this huge amount of data is one ...
AbstractThe KDD data set is a well known benchmark in the research of Intrusion Detection techniques...
Intrusion Detection System (IDS) use models as a basis for detecting intrusions. To ensure that thes...
Nowadays it is imperative to maintain a high level of security to ensure secure communication of inf...
Redundant and irrelevant features in data have caused a long-term problem in network traffic classif...
Abstract — Internet and internet users are increasing day by day. Also due to rapid development of i...
Abstract — There is wide use of internet for data exchange and increasing rapidly in almost all the ...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
An intrusion detection system’s (IDS) key role is to recognise anomalous activities from both inside...
Now in these days due to rapidly increasing network applications the data and privacy security in ne...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...