Research on Intelligent Detection of Intrusion Data in Network

被引:0
|
作者
Zhu, Guangjie [1 ]
Yao, Honglei [1 ]
机构
[1] China Acad Railway Sci Corp Ltd, Inst Comp Technol, Beijing, Peoples R China
关键词
Network Security; Computation Consumption; Data Mining; Machine Learning;
D O I
10.1109/CAC51589.2020.9326803
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The typical algorithms in machine learning and data mining are described and compared based on the advantages from individual algorithm including computation consumption and computation capacities. Based on the research on the novel academic paper, the problems to be solved are analyzed in network security. Besides, some suggestions are provided to adapt to specific scenarios.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 50 条
  • [41] Network intrusion intelligent real-time detection system
    Zhao, Haibo
    Li, Jianhua
    Yang, Yuhang
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 1999, 33 (01): : 76 - 79
  • [42] Data fusion and network intrusion detection systems
    Ahmad, Rasheed
    Alsmadi, Izzat
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7493 - 7519
  • [43] Hierarchical visualization of network intrusion detection data
    Itoh, T
    Takakura, H
    Sawada, A
    Koyamada, K
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2006, 26 (02) : 40 - 47
  • [44] Data Fusion for Network Intrusion Detection: A Review
    Li, Guoquan
    Yan, Zheng
    Fu, Yulong
    Chen, Hanlu
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [45] Intrusion Detection Over Encrypted Network Data
    Karacay, Leyli
    Savas, Erkay
    Alptekin, Halit
    COMPUTER JOURNAL, 2020, 63 (04): : 604 - 619
  • [46] The research of intelligent intrusion detection system based on genetic algorithms
    Wu Duosheng
    Wang Fan
    Wang Xiaolin
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6226 - 6229
  • [47] Intelligent intrusion detection based on fuzzy Big Data classification
    Jemili, Farah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3719 - 3736
  • [48] Intelligent intrusion detection based on fuzzy Big Data classification
    Farah Jemili
    Cluster Computing, 2023, 26 : 3719 - 3736
  • [49] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
  • [50] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447