Abstract:  Nowadays, Cyber-attacks are occurring progressively. Along with this, diversity, size and density of the cyber-attacks are increasing.  When the logs of security devices are analyzed, massive amounts of attack signs are detained. Besides, it is also difficult for humans to evaluate the logs accurately. Therefore, the identification of key data, which can be used to distinguish an attack from this very large data set, is important for both rapid detection of attacks and rapid response of security devices. This study focuses on selection of appropriate features from logs via  machine  learning  and  determining the distinctive  attributes  specific  to  an attack in  the  selection  of  these  data. Based on the selected features, a classification methodology is proposed.

Keywords: Classifiers, Intrusion Detection System, Weka Tool


PDF | DOI: 10.17148/IJARCCE.2019.81204

Open chat
Chat with IJARCCE