{"title":"Machine learning techniques applied to intruder detection in networks","authors":"J. L. Henao R, J. E. Espinosa O","doi":"10.1109/ccst.2013.6922081","DOIUrl":null,"url":null,"abstract":"The intrusion in data networks, are a constant problem faced by networks administrators. Because of this, it is necessary identify, study and propose techniques to detect the moment in which the network is attacked, with the purpose of take measures to mitigate these threats. In this paper was conducted a study of the threats taxonomy that could lead to an attack in a data network. For this, we have identified the most relevant characteristics of the network traffic in order to be processed and classified using machine learning techniques, specifically the normalization (Z-Score), dimensionality reduction (PCA) and classification based on artificial neural networks (ANN) to suggest an intrusion detection system (IDS).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 47th International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ccst.2013.6922081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The intrusion in data networks, are a constant problem faced by networks administrators. Because of this, it is necessary identify, study and propose techniques to detect the moment in which the network is attacked, with the purpose of take measures to mitigate these threats. In this paper was conducted a study of the threats taxonomy that could lead to an attack in a data network. For this, we have identified the most relevant characteristics of the network traffic in order to be processed and classified using machine learning techniques, specifically the normalization (Z-Score), dimensionality reduction (PCA) and classification based on artificial neural networks (ANN) to suggest an intrusion detection system (IDS).