Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 19 (2023)  /  Artículo
ARTÍCULO
TITULO

A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications

Merve Ozkan-Okay    
Refik Samet    
Ömer Aslan    
Selahattin Kosunalp    
Teodor Iliev and Ivaylo Stoyanov    

Resumen

The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The number, sophistication, and severity of network-related attacks are growing rapidly. There are a variety of different attacks including remote-to-user (R2L), user-to-remote (U2R), denial of service (DoS), distributed DDoS, and probing. Firewalls, antivirus scanners, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) are widely used to prevent and stop cyber-related attacks. Especially, IDPSs are used to stop and prevent intrusions on communication networks. However, traditional IDSs are no longer effective in detecting complicated cyber attacks from normal network traffic. Because of this, new promising techniques, which specifically utilize data mining, machine learning, and deep learning, need to be proposed in order to distinguish intrusions from normal network traffic. To effectively recognize intrusions, the feature generation, feature selection, and learning processes must be performed delicately before the classification stage. In this study, a new feature selection method called FSAP (Feature Selection Approach) is proposed. In addition, a hybrid attack detection model called SABADT (Signature- and Anomaly-Based Attack Detection Technique) is suggested, which utilizes different classification metrics to recognize attacks. The proposed general method FSACM (Feature Selection and Attack Classification Method) is tested on KDD ?99, UNSW-NB15, and CIC-IDS2017 datasets. According to the experiment results, the proposed method outperformed the state-of-the-art methods in the literature in terms of detection, accuracy, and false-alarm rates.

 Artículos similares

       
 
Fang Gui, Jiaoyun Yang, Yiming Tang, Hongtu Chen and Ning An    
The life stories of older adults encapsulate an array of personal experiences that reflect their care needs. However, due to inherent fuzzy features, fragmented natures, repetition, and redundancies, the practical application of the life story approach p... ver más
Revista: Applied Sciences

 
Hao An, Ruotong Ma, Yuhan Yan, Tailai Chen, Yuchen Zhao, Pan Li, Jifeng Li, Xinyue Wang, Dongchen Fan and Chunli Lv    
This paper aims to address the increasingly severe security threats in financial systems by proposing a novel financial attack detection model, Finsformer. This model integrates the advanced Transformer architecture with the innovative cluster-attention ... ver más
Revista: Applied Sciences

 
Wenhao Sun, Yidong Zou, Yunhe Wang, Boyi Xiao, Haichuan Zhang and Zhihuai Xiao    
In the practical production environment, the complexity and variability of hydroelectric units often result in a need for more fault data, leading to inadequate accuracy in fault identification for data-driven intelligent diagnostic models. To address th... ver más
Revista: Water

 
Puti Yan, Zhen Cao, Jiangbo Peng, Chaobo Yang, Xin Yu, Penghua Qiu, Shanchun Zhang, Minghong Han, Wenbei Liu and Zuo Jiang    
A flame?s structural feature is a crucial parameter required to comprehensively understand the interaction between turbulence and flames. The generation and evolution processes of the structure feature have rarely been investigated in lean blowout (LBO) ... ver más
Revista: Aerospace

 
Umberto Saetti, Jonathan Rogers, Mushfiqul Alam and Michael Jump    
A novel trajectory generation and control architecture for fully autonomous autorotative flare that combines rapid path generation with model-based control is proposed. The trajectory generation component uses optical Tau theory to compute flare trajecto... ver más
Revista: Aerospace