نتایج جستجو برای: پایگاه داده NSL-KDD

تعداد نتایج: 219169  

Journal: :Journal of Pharmaceutical Negative Results 2022

ژورنال: مهندسی مخابرات 2020

سیستم‌های تشخیص نفوذ برای ایجاد امنیت در شبکه‌های کامپیوتری پیشنهاد شده‌اند تا در صورتی که نفوذگر از سایر تجهیزات امنیتی عبور کرد، بتواند آن را تشخیص داده و از پیش‌روی آن جلوگیری کند. یکی از مهمترین چالش­های این سیستم­ها، ابعاد بالای داده­های آن می­باشد. در این تحقیق برای کاهش ابعاد داده­ای از یک الگوریتم ژنتیک ساده با طول رشته متغیر استفاده می­کنیم. در مرحله بعد با توجه به ویژگی­های انتخاب شده...

2016
Md. Al Mehedi Hasan Shuxiang Xu Jahangir Kabir

The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with numerous features. As a result, in order to get rid of this problem, several types of intrusion detection methods with different levels of accuracy have been proposed which leads the choice of an effective and robust method for...

2017
Nilofer Shoaib Khan

In the field of internet, network based application plays a vital role, where data transfers mostly in digital forms in various formats from source to destinations. In this digital exchange of information there are several possibilities of attacks and vulnerabilities. Intrusion detection systems are widely used to protect networks. An efficient detection of intrusion from network data set is a ...

2010
Mrutyunjaya Panda Ajith Abraham Manas Ranjan Patra

This paper applies discriminative multinomial Naïve Bayes with various filtering analysis in order to build a network intrusion detection system. For our experimental analysis, we used the new NSL-KDD dataset, which is considered as a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. We perform 2 class classifications with 10-fold cross validation for building our proposed...

2017
Manoj Kumar

Data Mining is a technique to drilling the database for giving meaning to the approachable data. It involves systematic analysis of large data sets. And the classification is used to manage data, sometimes tree modeling of data helps to make predictions about new data. Recently, we have increasing in the number of cyber-attacks, detecting the intrusion in networks become a very tough job. In Ne...

Journal: :Information Technology in Industry 2021

Deep learning based intrusion detection cyber security methods gained increased popularity. The essential element to provide protection the ICT infrastructure is systems (IDSs). Intelligent solutions are necessary control complexity and increase in new attack types. intelligent system (DL/ML) has been widely used with its benefits effectively deal complex great dimensional data. IDS various typ...

2017
Rashmi Chaudhari Sonal Patil

An Intrusion detection system (IDS) is a device or a software application that monitors a network or systems for malicious activity or policy violations. Intrusion Detection Systems supports to discover, determine, and identify unauthorized use, duplication, alteration, and destruction of information systems. So, to make intrusion detection system more efficient, the techniques that are more ad...

2013
NIKITA GUPTA NARENDER SINGH VIJAY SHARMA TARUN SHARMA AMAN SINGH BHANDARI

With the expansion of computer network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper we propose an intrusion detection system that uses rough set theory for feature selection, which is extraction of relevan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید