Bayesian Classifiers in Intrusion Detection Systems
To be able to identify computer attacks, detection systems that are based on faults are not dependent on data base upgrades unlike the ones based on misuse. The first type of systems mentioned generate a knowledge pattern from which the usual and unusual traffic is distinguished. Within computer net...
- Autores:
-
Mardini-Bovea, Johan
De-La-Hoz-Franco, Emiro
Molina Estren, Diego
Ariza Colpas, Paola Patricia
Ortíz, Andrés
Ortega, Julio
R. Cárdenas, César A.
COLLAZOS MORALES, CARLOS ANDRES
- Tipo de recurso:
- http://purl.org/coar/resource_type/c_816b
- Fecha de publicación:
- 2020
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/6241
- Acceso en línea:
- https://hdl.handle.net/11323/6241
https://doi.org/10.1007/978-3-030-45778-5_26
https://repositorio.cuc.edu.co/
- Palabra clave:
- Naïve bayes
Bayesian networks
Feature selection
- Rights
- openAccess
- License
- CC0 1.0 Universal
Summary: | To be able to identify computer attacks, detection systems that are based on faults are not dependent on data base upgrades unlike the ones based on misuse. The first type of systems mentioned generate a knowledge pattern from which the usual and unusual traffic is distinguished. Within computer networks, different classification traffic techniques have been implemented in intruder detection systems based on abnormalities. These try to improve the measurement that assess the performance quality of classifiers and reduce computational cost. In this research work, a comparative analysis of the obtained results is carried out after implementing different selection techniques such as Info.Gain, Gain ratio and Relief as well as Bayesian (Naïve Bayes and Bayesians Networks). Hence, 97.6% of right answers were got with 13 features. Likewise, through the implementation of both load balanced methods and attributes normalization and choice, it was also possible to diminish the number of features used in the ID classification process. Also, a reduced computational expense was achieved. |
---|