Movatterモバイル変換


[0]ホーム

URL:


loading
PapersPapers/2022PapersPapers/2022

Scitepress Logo

The Search is performed on all of the following fields:

Note: Please use complete words only.
  • Publication Title
  • Abstract
  • Publication Keywords
  • DOI
  • Proceeding Title
  • Proceeding Foreword
  • ISBN (Completed)
  • Insticc Ontology
  • Author Affiliation
  • Author Name
  • Editor Name
If you already have a Primoris Account you can use the same username/password here.
Research.Publish.Connect.

The Search is performed on all of the following fields:

Note: Please use complete words only.
  • Publication Title
  • Abstract
  • Publication Keywords
  • DOI
  • Proceeding Title
  • Proceeding Foreword
  • ISBN (Completed)
  • Insticc Ontology
  • Author Affiliation
  • Author Name
  • Editor Name
If you're looking for an exact phrase use quotation marks on text fields.

Paper

Paper Unlock

Authors:Roberto Saia;Alessandro Sebastian Podda;Gianni Fenu andRiccardo Balia

Affiliation:Department of Mathematics and Computer Science, University of Cagliari, Via Ospedale 72, 09124 Cagliari, Italy

Keyword(s):Intrusion Detection, Security, Networking, Data Decomposition, Algorithms.

Abstract:Anyone working in the field of network intrusion detection has been able to observe how it involves an ever- increasing number of techniques and strategies aimed to overcome the issues that affect the state-of-the-art solutions. Data unbalance and heterogeneity are only some representative examples of them, and each misclassification made in this context could have enormous repercussions in different crucial areas such as, for instance, financial, privacy, and public reputation. This happens because the current scenario is characterized by a huge number of public and private network-based services. The idea behind the proposed work is decomposing the canonical classification process into several sub-processes, where the final classification depends on all the sub-processes results, plus the canonical one. The proposed Training Data Decomposition (TDD) strategy is applied on the training datasets, where it applies a decomposition into regions, according to a defined number of events and features. The reason that leads this process is related to the observation that the same network event could be evaluated in a different manner, when it is evaluated in different time periods and/or when it involves different features. According to this observation, the proposed approach adopts different classification models, each of them trained in a different data region characterized by different time periods and features, classifying the event both on the basis of all model results, and on the basis of the canonical strategy that involves all data.(More)

Anyone working in the field of network intrusion detection has been able to observe how it involves an ever- increasing number of techniques and strategies aimed to overcome the issues that affect the state-of-the-art solutions. Data unbalance and heterogeneity are only some representative examples of them, and each misclassification made in this context could have enormous repercussions in different crucial areas such as, for instance, financial, privacy, and public reputation. This happens because the current scenario is characterized by a huge number of public and private network-based services. The idea behind the proposed work is decomposing the canonical classification process into several sub-processes, where the final classification depends on all the sub-processes results, plus the canonical one. The proposed Training Data Decomposition (TDD) strategy is applied on the training datasets, where it applies a decomposition into regions, according to a defined number of events and features. The reason that leads this process is related to the observation that the same network event could be evaluated in a different manner, when it is evaluated in different time periods and/or when it involves different features. According to this observation, the proposed approach adopts different classification models, each of them trained in a different data region characterized by different time periods and features, classifying the event both on the basis of all model results, and on the basis of the canonical strategy that involves all data.

Full Text

Download
Please type the code

CC BY-NC-ND 4.0

Sign In

Guests can use SciTePress Digital Library without having a SciTePress account. However, guests have limited access to downloading full text versions of papers and no access to special options.
Guests can use SciTePress Digital Library without having a SciTePress account. However, guests have limited access to downloading full text versions of papers and no access to special options.
Guest:Register as new SciTePress user now for free.

Sign In

Download limit per month - 500 recent papers or 4000 papers more than 2 years old.
SciTePress user: please login.

PDF ImageMy Papers

PopUp Banner

Unable to see papers previously downloaded, because you haven't logged in as SciTePress Member.

If you are already a member please login.
You are not signed in, therefore limits apply to your IP address 153.126.140.213

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total
Popup Banner

PDF ButtonFull Text

Download
Please type the code

Paper citation in several formats:
Saia, R., Podda, A. S., Fenu, G. and Balia, R. (2021).Decomposing Training Data to Improve Network Intrusion Detection Performance. InProceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2021) - KDIR; ISBN 978-989-758-533-3; ISSN 2184-3228, SciTePress, pages 241-248. DOI: 10.5220/0010661400003064

@conference{kdir21,
author={Roberto Saia and Alessandro Sebastian Podda and Gianni Fenu and Riccardo Balia},
title={Decomposing Training Data to Improve Network Intrusion Detection Performance},
booktitle={Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2021) - KDIR},
year={2021},
pages={241-248},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010661400003064},
isbn={978-989-758-533-3},
issn={2184-3228},
}

TY - CONF

JO - Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2021) - KDIR
TI - Decomposing Training Data to Improve Network Intrusion Detection Performance
SN - 978-989-758-533-3
IS - 2184-3228
AU - Saia, R.
AU - Podda, A.
AU - Fenu, G.
AU - Balia, R.
PY - 2021
SP - 241
EP - 248
DO - 10.5220/0010661400003064
PB - SciTePress

    - Science and Technology Publications, Lda.
    RESOURCES

    Proceedings

    Papers

    Authors

    Ontology

    CONTACTS

    Science and Technology Publications, Lda
    Avenida de S. Francisco Xavier, Lote 7 Cv. C,
    2900-616 Setúbal, Portugal.

    Phone: +351 265 520 185(National fixed network call)
    Fax: +351 265 520 186
    Email:info@scitepress.org

    EXTERNAL LINKS

    PRIMORIS

    INSTICC

    SCITEVENTS

    CROSSREF

    PROCEEDINGS SUBMITTED FOR INDEXATION BY:

    dblp

    Ei Compendex

    SCOPUS

    Semantic Scholar

    Google Scholar

    Microsoft Academic


    [8]
    ページ先頭

    ©2009-2025 Movatter.jp