Network Attribute Selection, Classification and Accuracy (NASCA) Procedure for Intrusion Detection Systems

被引:0
作者
Stefanova, Zheni [1 ]
Ramachandran, Kandethody [1 ]
机构
[1] Univ S Florida, Dept Math & Stat, Tampa, FL 33620 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST) | 2017年
关键词
cybersecurity; network; vulnerability; NASCA; Intrusion Detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the progressive development of network applications and software dependency, we need to discover more advanced methods for protecting our systems. Each industry is equally affected, and regardless of whether we consider the vulnerability of the government or each individual household or company, we have to find a sophisticated and secure way to defend our systems. The starting point is to create a reliable intrusion detection mechanism that will help us to identify the attack at a very early stage; otherwise in the cyber security space the intrusion can affect the system negatively, which can cause enormous consequences and damage the system's privacy, security or financial stability. This paper proposes a concise, and easy to use statistical learning procedure, abbreviated NASCA, which is a four-stage intrusion detection method that can successfully detect unwanted intrusion to our systems. The model is static, but it can be adapted to a dynamic set up.
引用
收藏
页数:7
相关论文
共 24 条
[1]  
Bahl Shilpa, 2015, 2015 5 INT C ADV COM
[2]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[3]  
Bühlmann P, 2002, ANN STAT, V30, P927
[4]  
Cannady James, 2009, 2009 3 INT C NETW SY
[5]  
Devasena C.Lakshmi., 2012, Bonfring International Journal of Man Machine Interface, V1, P5
[6]  
Forman G., 2002, Principles of Data Mining and Knowledge Discovery. 6th European Conference, PKDD 2002. Proceedings (Lecture Notes in Artificial Intelligence Vol.2431), P150
[7]   Technical note: Using model trees for classification [J].
Frank, E ;
Wang, Y ;
Inglis, S ;
Holmes, G ;
Witten, IH .
MACHINE LEARNING, 1998, 32 (01) :63-76
[8]  
Frank E., 1998, Machine Learning. Proceedings of the Fifteenth International Conference (ICML'98), P144
[9]  
Guyon I., FEATURE EXTRACTION S, P1
[10]   Benchmarking attribute selection techniques for discrete class data mining [J].
Hall, MA ;
Holmes, G .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) :1437-1447