综述:随机梯度下降分类器、线性判别分析、深度学习和朴素贝叶斯分类器在网络入侵检测中的应用

O. Osho, Sungbum Hong
{"title":"综述:随机梯度下降分类器、线性判别分析、深度学习和朴素贝叶斯分类器在网络入侵检测中的应用","authors":"O. Osho, Sungbum Hong","doi":"10.17577/IJERTV10IS040188","DOIUrl":null,"url":null,"abstract":"The security of Network Systems is ravaged by attacks on Systems in a bid to gain unauthorized access into the network system. The aim of Network Intrusion Detection Systems is to detect anomaly patterns either while the attack is unfolding or after evidence that an intrusion occurred. The demand and crave for Internet usage have surged over the years and will continue to rise, which also puts gadgets that are connected to Networks at risk of attacks by Cyber Terrorist and hackers. This problem is not limited to individuals or Corporations alone but also E-Governments and Enterprises, despite billions of dollars allocated to Cyber Security, computer systems and networks do not give a 100 percent guarantee against Cyber-attacks. It is against this backdrop that we must establish Network Intrusion Detection Systems to reveal and counter Cyber-attacks on Networks and Computer Systems. Keywords—Component; formatting; style; styling; Cyber Security; machine learning, Netwrok Intrusion Detection.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An Overview: Stochastic Gradient Descent Classifier, Linear Discriminant Analysis, Deep Learning and Naive Bayes Classifier Approaches to Network Intrusion Detection\",\"authors\":\"O. Osho, Sungbum Hong\",\"doi\":\"10.17577/IJERTV10IS040188\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of Network Systems is ravaged by attacks on Systems in a bid to gain unauthorized access into the network system. The aim of Network Intrusion Detection Systems is to detect anomaly patterns either while the attack is unfolding or after evidence that an intrusion occurred. The demand and crave for Internet usage have surged over the years and will continue to rise, which also puts gadgets that are connected to Networks at risk of attacks by Cyber Terrorist and hackers. This problem is not limited to individuals or Corporations alone but also E-Governments and Enterprises, despite billions of dollars allocated to Cyber Security, computer systems and networks do not give a 100 percent guarantee against Cyber-attacks. It is against this backdrop that we must establish Network Intrusion Detection Systems to reveal and counter Cyber-attacks on Networks and Computer Systems. Keywords—Component; formatting; style; styling; Cyber Security; machine learning, Netwrok Intrusion Detection.\",\"PeriodicalId\":14123,\"journal\":{\"name\":\"International journal of engineering research and technology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of engineering research and technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17577/IJERTV10IS040188\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of engineering research and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17577/IJERTV10IS040188","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

网络系统的安全性受到系统攻击的破坏,攻击者试图获得对网络系统的未经授权的访问。网络入侵检测系统的目的是在攻击展开时或有证据表明入侵发生后检测异常模式。多年来,人们对互联网的需求和渴望激增,并将继续增长,这也使连接到网络的设备面临网络恐怖分子和黑客攻击的风险。这个问题不仅局限于个人或公司,也包括电子政府和企业,尽管数十亿美元被分配给网络安全,计算机系统和网络并不能100%保证不受网络攻击。在这种背景下,我们必须建立网络入侵检测系统,以发现和应对网络和计算机系统的网络攻击。Keywords-Component;格式;风格;样式;网络安全;机器学习,网络入侵检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An Overview: Stochastic Gradient Descent Classifier, Linear Discriminant Analysis, Deep Learning and Naive Bayes Classifier Approaches to Network Intrusion Detection
The security of Network Systems is ravaged by attacks on Systems in a bid to gain unauthorized access into the network system. The aim of Network Intrusion Detection Systems is to detect anomaly patterns either while the attack is unfolding or after evidence that an intrusion occurred. The demand and crave for Internet usage have surged over the years and will continue to rise, which also puts gadgets that are connected to Networks at risk of attacks by Cyber Terrorist and hackers. This problem is not limited to individuals or Corporations alone but also E-Governments and Enterprises, despite billions of dollars allocated to Cyber Security, computer systems and networks do not give a 100 percent guarantee against Cyber-attacks. It is against this backdrop that we must establish Network Intrusion Detection Systems to reveal and counter Cyber-attacks on Networks and Computer Systems. Keywords—Component; formatting; style; styling; Cyber Security; machine learning, Netwrok Intrusion Detection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
New Equations for Rate of Energy Dissipation of a Stepped Spillway with Slope less than Critical and Specific Step Height Blockchain-Based Secure Smart Health IoT solution Using RBAC Architecture Fatigue life assessment of high-speed train’s bogie frame due to dynamic loads under the influence of wheel flat Luenberger Observer-Based Speed Sensor Fault Detection: real time implementation to DC Motors Ultra-High-Performance Concrete (UHPC) - Applications Worldwide: A State-of-the-Art Review
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1