作者: A. Branitskiy , I. Kotenko
DOI: 10.1016/J.JOCS.2016.07.010
关键词: Set (abstract data type) 、 Machine learning 、 Signature (logic) 、 Data mining 、 Artificial intelligence 、 Computer science 、 Network security 、 Artificial neural network 、 Computational intelligence 、 Support vector machine 、 Identification (information) 、 Basis (linear algebra)
摘要: Abstract The paper is devoted to identification and classification of network traffic connections by various hybridization schemes with the goal efficient attack detection. For this purpose combination different methods computational intelligence used, namely neural networks, immune systems, neuro-fuzzy classifiers support vector machines. To increase speed processing input vectors it proposed apply method principal components. A distinctive feature advantage approach suggested a multi-level analysis traffic, providing possibility detect attacks signature based technique combining set adaptive detectors on methods. describes software tool that built basis mechanisms. Computational experiments were carried out serve as evidence their effectiveness in detection both known unknown attacks.