{"title":"机器学习技术在网络入侵者检测中的应用","authors":"J. L. Henao R, J. E. Espinosa O","doi":"10.1109/ccst.2013.6922081","DOIUrl":null,"url":null,"abstract":"The intrusion in data networks, are a constant problem faced by networks administrators. Because of this, it is necessary identify, study and propose techniques to detect the moment in which the network is attacked, with the purpose of take measures to mitigate these threats. In this paper was conducted a study of the threats taxonomy that could lead to an attack in a data network. For this, we have identified the most relevant characteristics of the network traffic in order to be processed and classified using machine learning techniques, specifically the normalization (Z-Score), dimensionality reduction (PCA) and classification based on artificial neural networks (ANN) to suggest an intrusion detection system (IDS).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Machine learning techniques applied to intruder detection in networks\",\"authors\":\"J. L. Henao R, J. E. Espinosa O\",\"doi\":\"10.1109/ccst.2013.6922081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The intrusion in data networks, are a constant problem faced by networks administrators. Because of this, it is necessary identify, study and propose techniques to detect the moment in which the network is attacked, with the purpose of take measures to mitigate these threats. In this paper was conducted a study of the threats taxonomy that could lead to an attack in a data network. For this, we have identified the most relevant characteristics of the network traffic in order to be processed and classified using machine learning techniques, specifically the normalization (Z-Score), dimensionality reduction (PCA) and classification based on artificial neural networks (ANN) to suggest an intrusion detection system (IDS).\",\"PeriodicalId\":243791,\"journal\":{\"name\":\"2013 47th International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"2011 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 47th International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ccst.2013.6922081\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 47th International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ccst.2013.6922081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Machine learning techniques applied to intruder detection in networks
The intrusion in data networks, are a constant problem faced by networks administrators. Because of this, it is necessary identify, study and propose techniques to detect the moment in which the network is attacked, with the purpose of take measures to mitigate these threats. In this paper was conducted a study of the threats taxonomy that could lead to an attack in a data network. For this, we have identified the most relevant characteristics of the network traffic in order to be processed and classified using machine learning techniques, specifically the normalization (Z-Score), dimensionality reduction (PCA) and classification based on artificial neural networks (ANN) to suggest an intrusion detection system (IDS).