透過您的圖書館登入
IP:18.217.109.151
  • 學位論文

利用有效的特徵選擇法之應用於阻斷式服務攻擊分類

Using Efficient Attribute Selection for Classifying Denial-of-Service Attacks

指導教授 : 鄭伯炤
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著網際網路的發達,許多網路服務產品也隨之推出,像是智慧型手機、筆記型電腦、個人行動助理、iPad等等,使用者運用這些裝置透過有線或無線的方式來存取網際網路的各種資源。但是由於網際網路是屬於開放式的環境,安全的威脅也相對提高許多,而網際網路服務的攻擊也有很多種,其中以阻斷式服務攻擊(Denial-of-Service attacks)最為常見,而可以代表阻斷式服務攻擊(Denial-of-Service attacks)的特徵有很多種,像KDDcup99裡面就提供了許多屬性特徵以及定義,可是在這麼多的特徵中,並不是所有的特徵都是必須要的,藉由本論文所用的方法應用於阻斷式服務攻擊,將不必要的特徵排除後,也不會影響到分類的結果,在排除後,相對地正確度也可以較高。

並列摘要


With the advancement of the Internet, many Internet service products produce, like smart phones, notebook computers, personal mobile assistant, iPad and so on. Users use these devices through wired or wireless means to access the various resources of the internet. Since the Internet is an open environment, the security threat is relatively improved a lot. There are many Internet service attacks, but Denial-of-Service attacks is the most common. Many attribute can be used to analysis attack behaviors, but not all attributes are necessary. This paper using an efficient attribute selection method. By excluding unnecessary attributes will not affect the classification results. After the exclusion, the accuracy can be relatively high.

並列關鍵字

Attribute selection

參考文獻


[1]Ashoor and Gore."Importance of Intrusion Detection system (IDS)." International Journal of Scientific
[2]Almulhem, Ahmad. "Network forensics: Notions and challenges." Signal Processing and Information
[4]Gopalakrishna, Rajeev. "A Framework for Distributed Intrusion Detection using Interest-Driven
Cooperating Agents."
[5]Kaushik, A. K., & Joshi, R. C. (2010). Network Forensic System for ICMP Attacks. International Journal

延伸閱讀