Characteristics categorization dataset KDD cup’99

S. Srivastava, Y. Sharma, Sheo Kumar
{"title":"Characteristics categorization dataset KDD cup’99","authors":"S. Srivastava, Y. Sharma, Sheo Kumar","doi":"10.1063/1.5122494","DOIUrl":null,"url":null,"abstract":"System security is an essential issue these days since the web utilization is expanding in multi-measurements mostly on account of much more use of convenient contraptions. The present web innovation experienced an issue of system security and information trustworthiness. Information For the uprightness and system security different application programming are utilized, for example, firewall and other checking antivirus programming. The regular monitoring of data and network need power full application and software such as intrusion detection system (IDS). Dataset will be helpful to identify malign intentions of network users without negotiating the security of the computer and the network. The dataset contain reasonable number of records in the train and test sets, which makes it affordable to run the experiments on the complete set without the need to randomly select a small portion.System security is an essential issue these days since the web utilization is expanding in multi-measurements mostly on account of much more use of convenient contraptions. The present web innovation experienced an issue of system security and information trustworthiness. Information For the uprightness and system security different application programming are utilized, for example, firewall and other checking antivirus programming. The regular monitoring of data and network need power full application and software such as intrusion detection system (IDS). Dataset will be helpful to identify malign intentions of network users without negotiating the security of the computer and the network. The dataset contain reasonable number of records in the train and test sets, which makes it affordable to run the experiments on the complete set without the need to randomly select a small portion.","PeriodicalId":7262,"journal":{"name":"ADVANCES IN BASIC SCIENCE (ICABS 2019)","volume":"7 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ADVANCES IN BASIC SCIENCE (ICABS 2019)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1063/1.5122494","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

System security is an essential issue these days since the web utilization is expanding in multi-measurements mostly on account of much more use of convenient contraptions. The present web innovation experienced an issue of system security and information trustworthiness. Information For the uprightness and system security different application programming are utilized, for example, firewall and other checking antivirus programming. The regular monitoring of data and network need power full application and software such as intrusion detection system (IDS). Dataset will be helpful to identify malign intentions of network users without negotiating the security of the computer and the network. The dataset contain reasonable number of records in the train and test sets, which makes it affordable to run the experiments on the complete set without the need to randomly select a small portion.System security is an essential issue these days since the web utilization is expanding in multi-measurements mostly on account of much more use of convenient contraptions. The present web innovation experienced an issue of system security and information trustworthiness. Information For the uprightness and system security different application programming are utilized, for example, firewall and other checking antivirus programming. The regular monitoring of data and network need power full application and software such as intrusion detection system (IDS). Dataset will be helpful to identify malign intentions of network users without negotiating the security of the computer and the network. The dataset contain reasonable number of records in the train and test sets, which makes it affordable to run the experiments on the complete set without the need to randomly select a small portion.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
特征分类数据集KDD cup ' 99
系统安全是一个重要的问题,这些天,因为网络的利用是扩大在多方面,主要是由于更多的使用方便的装置。当前的网络创新经历了系统安全与信息可信的问题。为了保证系统的正确性和安全性,采用了不同的应用程序编程,例如防火墙和其他防病毒检查编程。对数据和网络的定期监控需要强大的应用程序和入侵检测系统(IDS)等软件。数据集将有助于识别网络用户的恶意意图,而无需协商计算机和网络的安全性。该数据集在训练集和测试集中包含合理数量的记录,这使得在完整的集合上运行实验可以负担得起,而不需要随机选择一小部分。系统安全是一个重要的问题,这些天,因为网络的利用是扩大在多方面,主要是由于更多的使用方便的装置。当前的网络创新经历了系统安全与信息可信的问题。为了保证系统的正确性和安全性,采用了不同的应用程序编程,例如防火墙和其他防病毒检查编程。对数据和网络的定期监控需要强大的应用程序和入侵检测系统(IDS)等软件。数据集将有助于识别网络用户的恶意意图,而无需协商计算机和网络的安全性。该数据集在训练集和测试集中包含合理数量的记录,这使得在完整的集合上运行实验可以负担得起,而不需要随机选择一小部分。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Measurements of third-order optical nonlinearity using Z-scan technique: A review The role of correlated hopping on magnetic properties of spin-1/2 Falicov-Kimball model on a triangular lattice Radiation induced effects on silk fibroin films Synthesis and characterization of As40Se60 nanostructured film Rietveld refinement and structural characterization of (La1.2Sr0.8) InMnO6 nanopowders synthesized by coprecipitation method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1