Improve the performance of support vector machine (SVM) in design of an intelligent IDS using feature ranking

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,059

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

NAEC02_085

تاریخ نمایه سازی: 15 بهمن 1393

Abstract:

with the expansion of the activities computer networks users in around the world and followed by growth complexity and size of data, detecting unauthorized activity and abuse is very difficult. Hence the computer network security is of great importance. So in this paper, intelligent security system based on machine learning for intrusion detection is designed. Support vector machine one of the intelligent analysis techniques in intrusion detection has m any usages that in this paper are being tried with SVM algorithm will classify authorized and unauthorized activities in computer networks. Finally, a new method scilicet using features ranking are propone that SVM performance is achieved improve the minimum false positive rate and precision rate in classification.

Authors

Faeghe Najafzade moghadam

Department of computer science Maziar Institute of Higher Education, Royan, Iran,

Ali Ghorbani

Department of computer science Maziar Institute of Higher Education, Royan, Iran,

Fazel Tavassoli

Department of Electrical Engineering,Maziar Institute of Higher Education, Royan, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. Northcutt, "Network Intrusion Detection: An Analyst's Hand- book, " ...
  • R. Graham, "FAQ: Network intrusion detection systems, " Version 0.8, ...
  • S. Akbar, K. N. Rao, and J. Chandulal, "Intrusion detection ...
  • E. Bloedorn, A. D. Christiansen, W. Hill, C. Skorupka, L. ...
  • Y. Hu and 9 Panda, "A data mining approach for ...
  • W. Lee, S. J. Stolfo, and K. W. Mok, "A ...
  • Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, ...
  • S. Mabu, C. Chen, N. Lu, K. Shimada, and K. ...
  • Cunningham, "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion ...
  • Y. Bai and H. Kobayashi, "Intrusion detection systems: technology and ...
  • C.-W. Hsu, C.-C. Chang, and C.-J. Lin, "A practical guide ...
  • S. Chebrolu, A. Abraham, and J. P. Thomas, "Feature deduction ...
  • _ ONFERENCE , 2000, pp. 247-254. ...
  • M. Kantardzic, Data mining: concepts, models, methods, and algorithms: Wiley-IEEE ...
  • نمایش کامل مراجع