Application of data mining to network intrusion detection: classifier selection model
HA Nguyen, D Choi - Challenges for Next Generation Network Operations …, 2008 - Springer
HA Nguyen, D Choi
Challenges for Next Generation Network Operations and Service Management: 11th …, 2008•SpringerAs network attacks have increased in number and severity over the past few years, intrusion
detection system (IDS) is increasingly becoming a critical component to secure the network.
Due to large volumes of security audit data as well as complex and dynamic properties of
intrusion behaviors, optimizing performance of IDS becomes an important open problem that
is receiving more and more attention from the research community. The uncertainty to
explore if certain algorithms perform better for certain attack classes constitutes the …
detection system (IDS) is increasingly becoming a critical component to secure the network.
Due to large volumes of security audit data as well as complex and dynamic properties of
intrusion behaviors, optimizing performance of IDS becomes an important open problem that
is receiving more and more attention from the research community. The uncertainty to
explore if certain algorithms perform better for certain attack classes constitutes the …
Abstract
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attention from the research community. The uncertainty to explore if certain algorithms perform better for certain attack classes constitutes the motivation for the reported herein. In this paper, we evaluate performance of a comprehensive set of classifier algorithms using KDD99 dataset. Based on evaluation results, best algorithms for each attack category is chosen and two classifier algorithm selection models are proposed. The simulation result comparison indicates that noticeable performance improvement and real-time intrusion detection can be achieved as we apply the proposed models to detect different kinds of network attacks.
Springer
Showing the best result for this search. See all results