{"title":"聚合分类算法与网络攻击数据集挖掘的比较评估","authors":"E. Rak, A. Szczur","doi":"10.1109/FUZZ45933.2021.9494487","DOIUrl":null,"url":null,"abstract":"Currently, we observe an enormous growth in the frequency of using the Internet, which is also causing an increase in attacks on computer nets. These phenomena significantly raise the importance of the use of Intrusion Detection Systems (IDS). Classification systems are an essential part of a cyber-attack detection task by classifying the attacks based on certain criteria. The purpose of this research is to assess the relative performance of five extensions of well-known classification methods using the distributivity law. The results of this investigation can help in the design of classification systems that use several classification methods, namely k-Nearest Neighbor, Naive Bayes, Support Vector Machine, Random Forests, and Multilayer Perceptron Network can be employed to increase the accuracy of the classification. This method requires the use of some adequate aggregation operators (e.g. average functions and triangular norms/conorms) for which the distributivity law occurs. The work contains principally the results of experiments carried out on the KDD'Cup 99 dataset using WEKA (Waikato Environment for Knowledge Analysis) tool.","PeriodicalId":151289,"journal":{"name":"2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","volume":"31 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparative assessment of aggregated classification algorithms with the use to mining a cyber-attack dataset\",\"authors\":\"E. Rak, A. Szczur\",\"doi\":\"10.1109/FUZZ45933.2021.9494487\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Currently, we observe an enormous growth in the frequency of using the Internet, which is also causing an increase in attacks on computer nets. These phenomena significantly raise the importance of the use of Intrusion Detection Systems (IDS). Classification systems are an essential part of a cyber-attack detection task by classifying the attacks based on certain criteria. The purpose of this research is to assess the relative performance of five extensions of well-known classification methods using the distributivity law. The results of this investigation can help in the design of classification systems that use several classification methods, namely k-Nearest Neighbor, Naive Bayes, Support Vector Machine, Random Forests, and Multilayer Perceptron Network can be employed to increase the accuracy of the classification. This method requires the use of some adequate aggregation operators (e.g. average functions and triangular norms/conorms) for which the distributivity law occurs. The work contains principally the results of experiments carried out on the KDD'Cup 99 dataset using WEKA (Waikato Environment for Knowledge Analysis) tool.\",\"PeriodicalId\":151289,\"journal\":{\"name\":\"2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)\",\"volume\":\"31 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FUZZ45933.2021.9494487\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FUZZ45933.2021.9494487","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
目前,我们观察到使用互联网的频率有了巨大的增长,这也导致了对计算机网络的攻击增加。这些现象显著地提高了使用入侵检测系统(IDS)的重要性。分类系统是网络攻击检测任务的重要组成部分,它根据一定的标准对攻击进行分类。本研究的目的是评估使用分配律的五种知名分类方法的扩展的相对性能。本研究的结果可以帮助分类系统的设计,这些分类系统可以使用k-最近邻、朴素贝叶斯、支持向量机、随机森林和多层感知器网络等几种分类方法来提高分类的准确性。这种方法需要使用一些适当的聚合算子(例如,平均函数和三角规范/规范),其中分布律出现。这项工作主要包含使用WEKA (Waikato Environment for Knowledge Analysis)工具在KDD'Cup 99数据集上进行的实验结果。
Comparative assessment of aggregated classification algorithms with the use to mining a cyber-attack dataset
Currently, we observe an enormous growth in the frequency of using the Internet, which is also causing an increase in attacks on computer nets. These phenomena significantly raise the importance of the use of Intrusion Detection Systems (IDS). Classification systems are an essential part of a cyber-attack detection task by classifying the attacks based on certain criteria. The purpose of this research is to assess the relative performance of five extensions of well-known classification methods using the distributivity law. The results of this investigation can help in the design of classification systems that use several classification methods, namely k-Nearest Neighbor, Naive Bayes, Support Vector Machine, Random Forests, and Multilayer Perceptron Network can be employed to increase the accuracy of the classification. This method requires the use of some adequate aggregation operators (e.g. average functions and triangular norms/conorms) for which the distributivity law occurs. The work contains principally the results of experiments carried out on the KDD'Cup 99 dataset using WEKA (Waikato Environment for Knowledge Analysis) tool.