All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Anomaly-based Network Intrusion Detection Methods

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F13%3A86088633" target="_blank" >RIV/61989100:27240/13:86088633 - isvavai.cz</a>

  • Result on the web

    <a href="http://advances.utc.sk/index.php/AEEE/article/view/877/909" target="_blank" >http://advances.utc.sk/index.php/AEEE/article/view/877/909</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Anomaly-based Network Intrusion Detection Methods

  • Original language description

    The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a supportor a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization our results. The WEKA is a collection of machine learning algorithms for data mining tasks.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    V - Vyzkumna aktivita podporovana z jinych verejnych zdroju

Others

  • Publication year

    2013

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Advances in Electrical and Electronic Engineering

  • ISSN

    1336-1376

  • e-ISSN

  • Volume of the periodical

    Vol 11

  • Issue of the periodical within the volume

    6

  • Country of publishing house

    CZ - CZECH REPUBLIC

  • Number of pages

    7

  • Pages from-to

    468 - 474

  • UT code for WoS article

  • EID of the result in the Scopus database