Mobility

An Optimized Feature Selection for Intrusion Detection Using Layered Conditional Random Fields With MAFS

Free registration required

Executive Summary

Intrusion detection systems are now an essential component in the overall network. With the rapid advancement in the network technologies including higher bandwidths and ease of connectivity of wireless and hand held devices, the main focus of intrusion detection has shifted from simple signature matching approaches to detecting attacks based on analyzing contextual information which may be specific to individual networks and applications. As a result, anomaly and hybrid intrusion detection approaches have gained significance. The Denial Of Service Attacks (DoS), Probe, User To Root (U2R) and Remote To Local (R2L) are some of the common attacks that affect network resources.

  • Format: PDF
  • Size: 674 KB