首页> 外文会议>Mathematical models for engineering science >Comparison of Soft-Computing techniques for Classification of Intrusion-Detection.
【24h】

Comparison of Soft-Computing techniques for Classification of Intrusion-Detection.

机译:用于入侵检测分类的软计算技术比较。

获取原文
获取原文并翻译 | 示例

摘要

One of the main weaknesses of signature-based intrusion-detection systems (IDSs) is their inability to detect new attacks or new versions of already known attack patterns. This topic has attracted the attention of many researchers over the past decade and has resulted, amongst other alternatives, in anomaly-based IDSs, which use statistical and/or data-mining techniques as a new approach to intrusion detection. Herein we present a comparison of classifiers known as Decision Trees and SVM machines, both of which use data-mining techniques, with and without applying attribute selection techniques, with the KDDCUP'99 data set and the Weka tool.
机译:基于签名的入侵检测系统(IDS)的主要弱点之一是它们无法检测到新的攻击或已知攻击模式的新版本。在过去的十年中,该主题吸引了许多研究人员的注意力,并导致了基于异常的IDS,这些IDS使用统计和/或数据挖掘技术作为入侵检测的新方法。在这里,我们将对分类器(称为决策树和SVM机器)进行比较,这两种分类器都使用数据挖掘技术(有无应用属性选择技术)以及KDDCUP'99数据集和Weka工具。

著录项

  • 来源
  • 会议地点 Tenerife(ES);Tenerife(ES)
  • 作者单位

    Dpto. Computer Architecture and Techonology Dpto. Applied Mathematics;

    Dpto. Computer Architecture and Techonology Dpto. Applied Mathematics;

    Dpto. Computer Architecture and Techonology Dpto. Applied Mathematics;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 系统科学;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号