Abstract: Nowadays, Cyber-attacks are occurring progressively. Along with this, diversity, size and density of the cyber-attacks are increasing. When the logs of security devices are analyzed, massive amounts of attack signs are detained. Besides, it is also difficult for humans to evaluate the logs accurately. Therefore, the identification of key data, which can be used to distinguish an attack from this very large data set, is important for both rapid detection of attacks and rapid response of security devices. This study focuses on selection of appropriate features from logs via machine learning and determining the distinctive attributes specific to an attack in the selection of these data. Based on the selected features, a classification methodology is proposed.
Keywords: Classifiers, Intrusion Detection System, Weka Tool
| DOI: 10.17148/IJARCCE.2019.81204