Anomaly-based Network Intrusion Detection Methods
The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence....
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
VSB-Technical University of Ostrava
2013-01-01
|
Series: | Advances in Electrical and Electronic Engineering |
Subjects: | |
Online Access: | http://advances.utc.sk/index.php/AEEE/article/view/877 |
id |
doaj-0d98e01804564d6aa1393744e4587bf0 |
---|---|
record_format |
Article |
spelling |
doaj-0d98e01804564d6aa1393744e4587bf02021-10-11T08:03:03ZengVSB-Technical University of OstravaAdvances in Electrical and Electronic Engineering1336-13761804-31192013-01-0111646847410.15598/aeee.v11i6.877628Anomaly-based Network Intrusion Detection MethodsPavel NevludMiroslav BuresLukas KapicakJaroslav ZdralekThe article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks.http://advances.utc.sk/index.php/AEEE/article/view/877anomaly-based detectionattackbayesian networksweka. |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Pavel Nevlud Miroslav Bures Lukas Kapicak Jaroslav Zdralek |
spellingShingle |
Pavel Nevlud Miroslav Bures Lukas Kapicak Jaroslav Zdralek Anomaly-based Network Intrusion Detection Methods Advances in Electrical and Electronic Engineering anomaly-based detection attack bayesian networks weka. |
author_facet |
Pavel Nevlud Miroslav Bures Lukas Kapicak Jaroslav Zdralek |
author_sort |
Pavel Nevlud |
title |
Anomaly-based Network Intrusion Detection Methods |
title_short |
Anomaly-based Network Intrusion Detection Methods |
title_full |
Anomaly-based Network Intrusion Detection Methods |
title_fullStr |
Anomaly-based Network Intrusion Detection Methods |
title_full_unstemmed |
Anomaly-based Network Intrusion Detection Methods |
title_sort |
anomaly-based network intrusion detection methods |
publisher |
VSB-Technical University of Ostrava |
series |
Advances in Electrical and Electronic Engineering |
issn |
1336-1376 1804-3119 |
publishDate |
2013-01-01 |
description |
The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks. |
topic |
anomaly-based detection attack bayesian networks weka. |
url |
http://advances.utc.sk/index.php/AEEE/article/view/877 |
work_keys_str_mv |
AT pavelnevlud anomalybasednetworkintrusiondetectionmethods AT miroslavbures anomalybasednetworkintrusiondetectionmethods AT lukaskapicak anomalybasednetworkintrusiondetectionmethods AT jaroslavzdralek anomalybasednetworkintrusiondetectionmethods |
_version_ |
1716828078929346560 |