The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ...
详细信息
ISBN:
(数字)9798331532215
ISBN:
(纸本)9798331532222
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex and frequent network attacks is the intrusion detection and prevention systems (IDSs and IPSs). Due to insufficient datasets, anomaly-based research in intrusion detection systems is plagued by imprecise deployment, analysis, and evaluation. The researchers analyzed a variety of datasets, including DARPA98, KDD99, ISC2012, and ADFA13, to assess how well their suggested intrusion detection and intrusion prevention techniques performed. There are several issues: lack of adequate attack coverage, unrepresentative payloads, and anonymised packet information, insufficient traffic volume and diversity, or a deficiency in feature set and metadata. This study is focused on CICIDS-2017 which is the recently updated IDS dataset that meets real-world requirements and is accessible publicly. In addition to benign network flows and distributed denial of service (DDoS) attacks, it contains seven common attack network flows as well. To provide the optimal combination of features for the identification of the attack category, it also assesses the efficacy of several machine learning (ML) algorithms and network traffic feature sets. Even though various ML techniques like Linear Regression, Random Forests, and Decision Tree can be used, and performed very well, Hybrid Algorithm is designed to get better analysis on dataset.
With the description of tGPON and qos principle, we introduce the flow classification technology and speed limit method to implement QoS and put the implementation way and workflow. Then we introduce the experiment st...
详细信息
In this paper, the auto-hub shape recognition algorithm using computer is studied thoroughly, including the basic functions of image processing, feature extraction, shape recognition and classification. It overcomes t...
详细信息
This article presents the key technologies of knowledge service, analysis of the computational language technology and ontology and their application in knowledge service. Additionally, this paper applies the SOA to t...
详细信息
To solve the problem of encrypting mechanism that existing database system provide, this paper proposed a new database encrypting middleware system architecture, illustrates the exec theory and encrypting/decrypting s...
详细信息
A novel Semi-supervised fuzzy clustering model based on mahalanobis distance is proposed in this paper, we show that the iterative formulas to solve this model is simple and comprehensible, and the standard FCM may be...
详细信息
In this paper, a message servicesystem is designed and implemented based on the WCF (Windows Communication Foundation) duplex communication. The uniform message service is provided for the internet clients and the in...
详细信息
Uses CAPTCHA in web page can to a certain extent, to resist the attacks from network. But many sites using the CAPTCHA is based on the English or the digital characters, and only adopts a simple deformation treatment,...
详细信息
In order to measure the trust for software behavior in trusted computing, a software behavior analysis and verification model based on Aspect Oriented Programming (AOP) is proposed. The model about software behavior d...
详细信息
Knowledge service is the integration of knowledge and services in which knowledge serves as a resource to be provided for consumers so as to achieve the purposes of knowledge exchanging, knowledge sharing and problem ...
详细信息
暂无评论