Feature selection and intrusion detection in cloud environment based on machine learning algorithms

A Javadpour, SK Abharian… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
2017 IEEE international symposium on parallel and distributed …, 2017ieeexplore.ieee.org
Characteristics and way of behavior of attacks and infiltrators on computer networks are
usually very difficult and need an expert. In addition; the advancement of computer networks,
the number of attacks and infiltrations is also increasing. In fact, the knowledge coming from
expert will lose its value over time and must be updated and made available to the system
and this makes the need for expert person always felt. In machine learning techniques,
knowledge is extracted from the data itself which has diminished the role of the expert …
Characteristics and way of behavior of attacks and infiltrators on computer networks are usually very difficult and need an expert. In addition; the advancement of computer networks, the number of attacks and infiltrations is also increasing. In fact, the knowledge coming from expert will lose its value over time and must be updated and made available to the system and this makes the need for expert person always felt. In machine learning techniques, knowledge is extracted from the data itself which has diminished the role of the expert. Various methods used to detect intrusions, such as statistical models, safe system approach, neural networks, etc., all weaken the fact that it uses all the features of an information packet rotating in the network for intrusion detection. Also, the huge volume of information and the unthinkable state space is also an important issue in the detection of intrusion. Therefore, the need for automatic identification of new and suspicious patterns in attempt for intrusion with the use of more efficient methods (Lower cost and higher performance) is needed more than before. The purpose of this study is to provide a new method based on intrusion detection systems and its various architectures aimed at increasing the accuracy of intrusion detection in cloud computing.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果