Skip to main content
Log in

Using data-mining methods to detect network attacks

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This paper investigates the possibility of using various data-mining methods for network attack detection. A modular architecture of an intrusion detection system has been designed that enables classification of network packets in several support vector machines.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aivazyan, S.A., Bukhshtaber, V.M., Enyukov, I.S., and Meshalkin, L.D., Prikladnaya statistika: Klassifikatsiya i snizhenie razmernosti: Spravochnoe izdanie (Applied Statistics: Classification and Dimension Reduction: Reference Guide), Moscow: Finansy i Statistika, 1989.

    Google Scholar 

  2. Hsu, Ch.-W., Chang, Ch.-Ch., and Lin, Ch.-J., A Practical Guide to Support Vector Classification. http://www.csie.ntu.edu.tw/~cjlin

  3. Fodor, I.K., A Survey of Dimension Reduction Techniques, U.S. Department of Energy by University of California, Lawrence Livermore National Laboratory, 2002.

    Google Scholar 

  4. van der Maaten, L.J.P., Postma, E.O., and van den Herik, H.J., Dimensionality Reduction: A Comparative Review, Maastricht: Maastricht University, the Netherlands.

  5. Carreira-Perpiñán, M.Á., A Review of Dimension Reduction Techniques. Technical Report CS-96-09, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. V. Platonov.

Additional information

Original Russian Text © V.V. Platonov, P.O. Semenov, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Platonov, V.V., Semenov, P.O. Using data-mining methods to detect network attacks. Aut. Control Comp. Sci. 49, 766–769 (2015). https://doi.org/10.3103/S0146411615080131

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080131

Keywords

Navigation