원문정보
초록
영어
Nowadays, much attention has been paid to intrusion detection system (IDS) which is closely linked to the safe use of network services. Several machine-learning paradigms including neural networks, linear genetic programming (LGP), support vector machines (SVM), Bayesian networks, multivariate adaptive regression splines (MARS) fuzzy inference systems (FISs), etc. have been investigated for the design of IDS. In this paper, we develop a hybrid method of C5.0 and SVM and investigate and evaluate the performance of our proposed method with DARPA dataset. The motivation for using the hybrid approach is to improve the accuracy of the intrusion detection system when compared to using individual SVM and individual SVM.
목차
1. Introduction
2. Related Work
3. Proposed Method
3.1. SVM Classifier
3.2. C5.0 Algorithm
3.3. Hybrid Decision tree–SVM (DT– SVM) Approach
4. Experiments
4.1. Data Set and Evaluation Criteria
4.2. Quality of Classification
5. Conclusions
References
저자정보
참고문헌
- 1An efficient intrusion detection system based on support vector machines and gradually feature removal method네이버 원문 이동
- 2Incorporating Hidden Markov Model into Anomaly Detection Technique for Network Intrusion Detection네이버 원문 이동
- 3Anomaly Detection Preprocessor for SNORT IDS System네이버 원문 이동
- 4Base on Data Mining In Intrusion Detection System Study네이버 원문 이동
- 5(Reference title not available)
- 6The Application of Machine Learning Methods to Intrusion Detection네이버 원문 이동
- 7A method of SVM with Normalization in Intrusion Detection네이버 원문 이동
- 8A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques네이버 원문 이동
- 9Alert Correlation and Prediction Using Data Mining and HMM네이버 원문 이동
- 10An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection네이버 원문 이동
- 11(Reference title not available)
- 12(Reference title not available)
- 13Euclidean-based Feature Selection for Network Intrusion Detection네이버 원문 이동
- 14Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013네이버 원문 이동