Machine learning techniques for accurate classification and detection of intrusions in computer network

نویسندگان

چکیده

An incursion into the computer network or system in issue occurs whenever there is an attempt made to circumvent defences that are place. Training and examination two basic components make up intrusion detection (IDS) each one may be analysed separately. During training, a number of distinct models built, which able distinguish between normal abnormal behaviours included within dataset. This article proposes combination ant colony optimization (ACO) firefly approach for feature selection. The final outcome giving careful thought selection features will eventually result greater accuracy categorisation. When classifying various sorts features, we use wide variety machine learning (ML) algorithms, including AdaBoost, gradient boost, Bayesian (BN), amongst others. tests assessments data obtained from three datasets, namely NSL-KDD, UNSW-NB15, CICIDS 2017. degree performance individual broken down its component parts, include F1 score, accuracy, precision, recall. Gradient boost performs far better when it comes recognising incursions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the clustering and classification data mining techniques in insurance fraud detection:the case of iranian car insurance

با توجه به گسترش روز افزون تقلب در حوزه بیمه به خصوص در بخش بیمه اتومبیل و تبعات منفی آن برای شرکت های بیمه، به کارگیری روش های مناسب و کارآمد به منظور شناسایی و کشف تقلب در این حوزه امری ضروری است. درک الگوی موجود در داده های مربوط به مطالبات گزارش شده گذشته می تواند در کشف واقعی یا غیرواقعی بودن ادعای خسارت، مفید باشد. یکی از متداول ترین و پرکاربردترین راه های کشف الگوی داده ها استفاده از ر...

Machine Learning Techniques for Network Intrusion Detection

Most of the currently available network security techniques are not able to cope with the dynamic and increasingly complex nature of cyber attacks on distributed computer systems. Therefore, an automated and adaptive defensive tool is imperative for computer networks. Alongside the existing prevention techniques such as encryption and firewalls, Intrusion Detection System (IDS) has established ...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

Detection and Classification of Network Intrusions using Hidden

This paper demonstrates that it is possible to model attacks with a low number of states and classify them using Hidden Markov Models with very low False Alarm rate and very few False Negatives. We also show that the models developed can be used for both detection and classification. We put emphasis on detection and classification of network intrusions and attacks using Hidden Markov Models and...

متن کامل

Machine Learning Techniques for Brain-computer Interfaces

This review discusses machine learning methods and their application to Brain-Computer Interfacing. A particular focus is placed on feature selection. We also point out common flaws when validating machine learning methods in the context of BCI. Finally we provide a brief overview on the Berlin-Brain Computer Interface (BBCI).

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of Electrical Engineering and Informatics

سال: 2023

ISSN: ['2302-9285']

DOI: https://doi.org/10.11591/eei.v12i4.4708