[go: up one dir, main page]

Asaju et al., 2017 - Google Patents

Intrusion detection system on a computer network using an ensemble of randomizable filtered classifier, K-nearest neighbor algorithm

Asaju et al., 2017

View PDF
Document ID
4598578332002469183
Author
Asaju L
Shola P
Franklin N
Abiola H
Publication year
Publication venue
FUW Trends Sci. Technol. J

External Links

Snippet

Intrusion detection is the process of monitor the event occurring in a computer network and analyzing them for signs of intrusions. In recent years, the needs of internet are felt in lives of many people. Accordingly, many studies have been done on security in virtual …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Olusola et al. Analysis of KDD’99 intrusion detection dataset for selection of relevance features
Chauhan et al. A comparative study of classification techniques for intrusion detection
Verma et al. Review of existing data sets for network intrusion detection system
Subaira et al. Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey
Chetan et al. Data mining based network intrusion detection system: A database centric approach
Chaudhari et al. Intrusion detection system: classification, techniques and datasets to implement
Asaju et al. Intrusion detection system on a computer network using an ensemble of randomizable filtered classifier, K-nearest neighbor algorithm
Dharamkar et al. A review of cyber attack classification technique based on data mining and neural network approach
Singh et al. Intrusion detection system using data mining a review
Niranjan et al. Security in data mining-a comprehensive survey
Yang et al. Clustering and classification based anomaly detection
Rafsanjani et al. Intrusion detection by data mining algorithms: a review
Aldhyani et al. Analysis of dimensionality reduction in intrusion detection
Singh et al. Network intrusion detection system using decision tree and KNN algorithm
Phutane et al. A survey of intrusion detection system using different data mining techniques
Agrawal et al. A review on various methods of intrusion detection system
Guan et al. Applications of fuzzy data mining methods for intrusion detection systems
Farid et al. Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection
Yogesh et al. Characterization of darknet traffic detection using time domain features
Chahira Model for intrusion detection based on hybrid feature selection techniques
Deepa et al. Efficient intrusion detection system using random tree
Malek et al. GUI-based user behavior intrusion detection
Ahmad et al. Hybrid intrusion detection method to increase anomaly detection by using data mining techniques
Aung et al. Hybrid intrusion detection system using K-means and random tree algorithms
Sabha Anomaly-based Intrusion Detection using Machine Learning Algorithms-A Review Paper