作者: Ill-Young Weon , Doo Heon Song , Chang-Hoon Lee
DOI:
关键词: Signature (logic) 、 False alarm 、 Field (computer science) 、 Principal (computer security) 、 Artificial intelligence 、 Data set 、 Anomaly-based intrusion detection system 、 Intrusion detection system 、 Machine learning 、 Constant false alarm rate 、 Computer science
摘要: In the field of network intrusion detection, both signature-based detec-tion system and machine learning-based detection possess advan-tages disadvantages. When two discrepant systems are combined in a way that former is used as main latter supporting system, measures validity alarms determined by filters out any false alarms. What more, such an approach can also detect attacks itself cannot detect. The objective this paper to propose model show more efficient than each individual system. We DARPA Data Set experiments order usefulness model. Snort was for experiment extended IBL (In-stance-based Learner) principal learning algorithm To compare performances algorithms, C4.5 used.