Anomaly-based Network Intrusion Detection Methods

The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence....

Full description

Bibliographic Details
Main Authors: Pavel Nevlud, Miroslav Bures, Lukas Kapicak, Jaroslav Zdralek
Format: Article
Language:English
Published: VSB-Technical University of Ostrava 2013-01-01
Series:Advances in Electrical and Electronic Engineering
Subjects:
Online Access:http://advances.utc.sk/index.php/AEEE/article/view/877
id doaj-0d98e01804564d6aa1393744e4587bf0
record_format Article
spelling doaj-0d98e01804564d6aa1393744e4587bf02021-10-11T08:03:03ZengVSB-Technical University of OstravaAdvances in Electrical and Electronic Engineering1336-13761804-31192013-01-0111646847410.15598/aeee.v11i6.877628Anomaly-based Network Intrusion Detection MethodsPavel NevludMiroslav BuresLukas KapicakJaroslav ZdralekThe article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks.http://advances.utc.sk/index.php/AEEE/article/view/877anomaly-based detectionattackbayesian networksweka.
collection DOAJ
language English
format Article
sources DOAJ
author Pavel Nevlud
Miroslav Bures
Lukas Kapicak
Jaroslav Zdralek
spellingShingle Pavel Nevlud
Miroslav Bures
Lukas Kapicak
Jaroslav Zdralek
Anomaly-based Network Intrusion Detection Methods
Advances in Electrical and Electronic Engineering
anomaly-based detection
attack
bayesian networks
weka.
author_facet Pavel Nevlud
Miroslav Bures
Lukas Kapicak
Jaroslav Zdralek
author_sort Pavel Nevlud
title Anomaly-based Network Intrusion Detection Methods
title_short Anomaly-based Network Intrusion Detection Methods
title_full Anomaly-based Network Intrusion Detection Methods
title_fullStr Anomaly-based Network Intrusion Detection Methods
title_full_unstemmed Anomaly-based Network Intrusion Detection Methods
title_sort anomaly-based network intrusion detection methods
publisher VSB-Technical University of Ostrava
series Advances in Electrical and Electronic Engineering
issn 1336-1376
1804-3119
publishDate 2013-01-01
description The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks.
topic anomaly-based detection
attack
bayesian networks
weka.
url http://advances.utc.sk/index.php/AEEE/article/view/877
work_keys_str_mv AT pavelnevlud anomalybasednetworkintrusiondetectionmethods
AT miroslavbures anomalybasednetworkintrusiondetectionmethods
AT lukaskapicak anomalybasednetworkintrusiondetectionmethods
AT jaroslavzdralek anomalybasednetworkintrusiondetectionmethods
_version_ 1716828078929346560