Abstract
The detection portion of Intrusion Detection System is the most complicated. The IDS goal is to make the network more secure, and the prevention portion of the IDS must accomplish that effort. After malicious or unwanted traffic is identified, using prevention techniques can stop it. When an IDS is placed in an inline configuration, all traffic must travel through an IDS sensor. In this paper the reduced the features and perform layered architecture for identify various attack (DoS, R2L, U2R, Probe) and show accuracy using SVM with genetic approach.
Reference40 articles.
1. Anderson. (1980). Computer Security Threat Monitoring and Surveillance. Technical Report. James P. Anderson Co.
2. Special issue on data mining for intrusion detection and threat analysis
3. Detecting Novel Network Intrusions Using Bayes Estimators
4. Blake, Keogh, & Merz. (2008). UCI repository of machine learning databases. Academic Press.
5. Selection of relevant features and examples in machine learning
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献