{"title":"一种判定恶意流量的有效方法","authors":"Ajay Kumar, Jitendra Singh, Vikas Kumar, Saurabh Shrivastava","doi":"10.4018/ijdsst.323191","DOIUrl":null,"url":null,"abstract":"To address the high rate of false alarms, this article proposed a voting-based method to efficiently predict intrusions in real time. To carry out this study, an intrusion detection dataset from UNSW was downloaded and preprocessed before being used. Given the number of features at hand and the large size of the dataset, performance was poor while accuracy was low. This low prediction accuracy led to the generation of false alerts, consequently, legitimate alerts used to pass without an action assuming them as false. To deal with large size and false alarms, the proposed voting-based feature reduction approach proved to be highly beneficial in reducing the dataset size by selecting only the features secured majority votes. Outcome collected prior to and following the application of the proposed model were compared. The findings reveal that the proposed approach required less time to predict, at the same time predicted accuracy was higher. The proposed approach will be extremely effective at detecting intrusions in real-time environments and mitigating the cyber-attacks.","PeriodicalId":42414,"journal":{"name":"International Journal of Decision Support System Technology","volume":"1 1","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Efficient Method to Decide the Malicious Traffic\",\"authors\":\"Ajay Kumar, Jitendra Singh, Vikas Kumar, Saurabh Shrivastava\",\"doi\":\"10.4018/ijdsst.323191\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To address the high rate of false alarms, this article proposed a voting-based method to efficiently predict intrusions in real time. To carry out this study, an intrusion detection dataset from UNSW was downloaded and preprocessed before being used. Given the number of features at hand and the large size of the dataset, performance was poor while accuracy was low. This low prediction accuracy led to the generation of false alerts, consequently, legitimate alerts used to pass without an action assuming them as false. To deal with large size and false alarms, the proposed voting-based feature reduction approach proved to be highly beneficial in reducing the dataset size by selecting only the features secured majority votes. Outcome collected prior to and following the application of the proposed model were compared. The findings reveal that the proposed approach required less time to predict, at the same time predicted accuracy was higher. The proposed approach will be extremely effective at detecting intrusions in real-time environments and mitigating the cyber-attacks.\",\"PeriodicalId\":42414,\"journal\":{\"name\":\"International Journal of Decision Support System Technology\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2023-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Decision Support System Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijdsst.323191\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Decision Support System Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijdsst.323191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
An Efficient Method to Decide the Malicious Traffic
To address the high rate of false alarms, this article proposed a voting-based method to efficiently predict intrusions in real time. To carry out this study, an intrusion detection dataset from UNSW was downloaded and preprocessed before being used. Given the number of features at hand and the large size of the dataset, performance was poor while accuracy was low. This low prediction accuracy led to the generation of false alerts, consequently, legitimate alerts used to pass without an action assuming them as false. To deal with large size and false alarms, the proposed voting-based feature reduction approach proved to be highly beneficial in reducing the dataset size by selecting only the features secured majority votes. Outcome collected prior to and following the application of the proposed model were compared. The findings reveal that the proposed approach required less time to predict, at the same time predicted accuracy was higher. The proposed approach will be extremely effective at detecting intrusions in real-time environments and mitigating the cyber-attacks.