Abstract
This paper investigates the possibility of using various data-mining methods for network attack detection. A modular architecture of an intrusion detection system has been designed that enables classification of network packets in several support vector machines.
Similar content being viewed by others
References
Aivazyan, S.A., Bukhshtaber, V.M., Enyukov, I.S., and Meshalkin, L.D., Prikladnaya statistika: Klassifikatsiya i snizhenie razmernosti: Spravochnoe izdanie (Applied Statistics: Classification and Dimension Reduction: Reference Guide), Moscow: Finansy i Statistika, 1989.
Hsu, Ch.-W., Chang, Ch.-Ch., and Lin, Ch.-J., A Practical Guide to Support Vector Classification. http://www.csie.ntu.edu.tw/~cjlin
Fodor, I.K., A Survey of Dimension Reduction Techniques, U.S. Department of Energy by University of California, Lawrence Livermore National Laboratory, 2002.
van der Maaten, L.J.P., Postma, E.O., and van den Herik, H.J., Dimensionality Reduction: A Comparative Review, Maastricht: Maastricht University, the Netherlands.
Carreira-Perpiñán, M.Á., A Review of Dimension Reduction Techniques. Technical Report CS-96-09, 1997.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © V.V. Platonov, P.O. Semenov, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Platonov, V.V., Semenov, P.O. Using data-mining methods to detect network attacks. Aut. Control Comp. Sci. 49, 766–769 (2015). https://doi.org/10.3103/S0146411615080131
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080131