[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/784590.784673guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Application of Machine Learning to Network Intrusion Detection

Published: 06 December 1999 Publication History

Abstract

Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequences of network connections. To support the analyst's job, we built an application which enhances domain knowledge with machine learning techniques to create rules for an intrusion detection expert system. We employ genetic algorithms and decision trees to automatically generate rules for classifying network connections. This paper describes the machine learning methodology and the applications employing this methodology.

Cited By

View all
  • (2019)Survey of Intrusion Detection Methods Based on Data Mining AlgorithmsProceedings of the 2019 International Conference on Big Data Engineering10.1145/3341620.3341632(98-106)Online publication date: 11-Jun-2019
  • (2018)Performance comparison of intrusion detection systems and application of machine learning to Snort systemFuture Generation Computer Systems10.1016/j.future.2017.10.01680:C(157-170)Online publication date: 1-Mar-2018
  • (2017)Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)Companion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148137(107-112)Online publication date: 5-Dec-2017
  • Show More Cited By
  1. An Application of Machine Learning to Network Intrusion Detection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference
    December 1999
    ISBN:0769503462

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 06 December 1999

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Survey of Intrusion Detection Methods Based on Data Mining AlgorithmsProceedings of the 2019 International Conference on Big Data Engineering10.1145/3341620.3341632(98-106)Online publication date: 11-Jun-2019
    • (2018)Performance comparison of intrusion detection systems and application of machine learning to Snort systemFuture Generation Computer Systems10.1016/j.future.2017.10.01680:C(157-170)Online publication date: 1-Mar-2018
    • (2017)Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)Companion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148137(107-112)Online publication date: 5-Dec-2017
    • (2017)Contextual information fusion for intrusion detectionKnowledge and Information Systems10.1007/s10115-017-1027-352:3(563-619)Online publication date: 1-Sep-2017
    • (2016)Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection datasetFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-015-5116-810:4(755-766)Online publication date: 1-Aug-2016
    • (2014)Classification of DOS Attacks Using Visualization TechniqueInternational Journal of Information Security and Privacy10.4018/IJISP.20140401028:2(19-32)Online publication date: 1-Apr-2014
    • (2014)Learning from the pastProceedings of the 8th ACM International Conference on Distributed Event-Based Systems10.1145/2611286.2611289(47-58)Online publication date: 26-May-2014
    • (2013)Event stream database based architecture to detect network intrusionProceedings of the 7th ACM international conference on Distributed event-based systems10.1145/2488222.2488276(241-248)Online publication date: 29-Jun-2013
    • (2012)A survey of anomaly intrusion detection techniquesJournal of Computing Sciences in Colleges10.5555/2379703.237970728:1(9-17)Online publication date: 1-Oct-2012
    • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media