...
首页> 外文期刊>International Journal of Applied Engineering Research >Detection and Analysis of Network Intrusions using Data Mining Approaches
【24h】

Detection and Analysis of Network Intrusions using Data Mining Approaches

机译:使用数据挖掘方法检测和分析网络入侵

获取原文
获取原文并翻译 | 示例

摘要

The ultimate role of an intrusion detection system is to identify network threats or attacks in contrast to computing systems. The intrusion detection system (IDS) is one of the essential network protection device or software for guarding computing systems and it is proficient to identify and to examine network traffic data packets. Snort is free open-source software used as a network protection tool. Though, the Snort tool can detect only acknowledged attacks. In order to detect advanced network attacks, this research paper is developed based on advanced snort rules; k-SVM classification method is used for detection of network attacks. In this paper, the KDDCUP'99 dataset is used for the experimental study. The main goal of this research paper is to detect fraudulent network traffic. The main phases of research are data preparation, including the cleaning process, classification of the dataset, feature extraction, proposed snort rules, detection of attacks. The proposed system has produced effective detection rates.
机译:入侵检测系统的最终作用是识别与计算系统相比的网络威胁或攻击。入侵检测系统(IDS)是用于保护计算系统的基本网络保护设备或软件之一,并且它熟练识别和检查网络流量数据分组。 Snort是用作网络保护工具的免费开源软件。虽然,Snort工具只能检测到确认的攻击。为了检测先进的网络攻击,本研究论文是基于高级Snort规则开发的; K-SVM分类方法用于检测网络攻击。在本文中,KDDCUP'99数据集用于实验研究。本研究论文的主要目标是检测欺诈性网络流量。研究的主要阶段是数据准备,包括清洁过程,数据集的分类,特征提取,提出的Snort规则,检测攻击。所提出的系统产生了有效的检测率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号