Intrusion Patterns Recognition in Computer Networks

被引:0
|
作者
Farzan, Ali [1 ,2 ]
Razavi, Naser [1 ]
Balafar, Mohammad Ali [1 ]
Arvin, Farshad [1 ]
机构
[1] Islamic Azad Univ, Shabestar Branch, Shabestar, Iran
[2] Univ Putra Malaysia, Serdang 43400, Malaysia
关键词
k-mean; Bayesian; SVM; Network Intrusion Detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the hottest research areas in recent years is detecting network intrusion patterns in computer networks. Because of dynamic nature of intrusion patterns in networks, intelligently inspecting the behavior of networks and detecting anomalies are mostly desirable. KDD-Cup99 pattern database are used as a standard source of network packets in our research. K-mean, Bayesian method and Support Network Machine (SVM) are used as anomaly detectors. Results show the superiority of SVM over other two methods regarding the accuracy of classifying patterns into normal packets and suspicious ones. It can be concluded that using high dimensional pattern recognition methods have reasonable competence in detecting attack patterns in computer networks.
引用
收藏
页码:433 / 436
页数:4
相关论文
共 50 条
  • [1] Intrusion recognition using neural networks
    Golovko, Vladimir
    Kochurko, Pavel
    [J]. 2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 108 - 111
  • [2] Mathematical Modelling of Malware Intrusion in Computer Networks
    Lazarov, Andon D.
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (03) : 29 - 47
  • [3] COMPUTER OPTIMIZATION OF RECOGNITION NETWORKS
    DRUCKER, H
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1969, C 18 (10) : 918 - +
  • [4] Intrusion detection and defending based on fuzzy patterns recognition
    Peng Tao
    Jiang Minghua
    [J]. Advanced Computer Technology, New Education, Proceedings, 2007, : 1332 - 1335
  • [5] Rule extraction from neural networks for intrusion detection in computer networks
    Hofmann, A
    Schmitz, C
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1259 - 1265
  • [6] Intrusion detection in computer networks with neural and fuzzy classifiers
    Hofmann, A
    Schmitz, C
    Sick, B
    [J]. ARTIFICIAL NEURAL NETWORKS AND NEURAL INFORMATION PROCESSING - ICAN/ICONIP 2003, 2003, 2714 : 316 - 324
  • [7] Fusion of multiple classifiers for intrusion detection in computer networks
    Giacinto, G
    Roli, F
    Didaci, L
    [J]. PATTERN RECOGNITION LETTERS, 2003, 24 (12) : 1795 - 1803
  • [8] Intrusion detection in computer networks by multiple classifier systems
    Glacinto, G
    Roli, F
    [J]. 16TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL II, PROCEEDINGS, 2002, : 390 - 393
  • [9] Game Theory Model for Intrusion Prevention in Computer Networks
    Mojica Sanchez, Julian Francisco
    Salcedo Parra, Octavio Jose
    Espitia R, Miguel J.
    [J]. MACHINE LEARNING FOR NETWORKING, 2019, 11407 : 307 - 320
  • [10] Analysis of intrusion detection and attack proliferation in computer networks
    Rangan, Prahalad
    Knuth, Kevin H.
    [J]. BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2007, 954 : 443 - +