An approach to solve computer attacks based on hybrid model
dc.contributor.author | Surat Srinoy | |
dc.contributor.author | Witcha Chimphlee | |
dc.contributor.author | Siriporn Chimphlee | |
dc.contributor.author | Yoothapoom Poopaibool | |
dc.contributor.correspondence | S. Srinoy; Faculty of Science and Technology, Suan Dusit Rajabhat University, Dusit, Bangkok, 295 Ratchasima Road, Thailand; email: surat_sri@dusit.ac.th | |
dc.date.accessioned | 2025-03-10T07:38:08Z | |
dc.date.available | 2025-03-10T07:38:08Z | |
dc.date.issued | 2006 | |
dc.description.abstract | It is an important issue for the security of network to detect new intrusion attack. We introduce the idea of the Independent component analysis (ICA) based feature selection heuristics, and present Support Vector Machine (SVM) algorithm for data classification. ICA aims at extracting unknown hidden factors/components from multivariate data using only the assumption that unknown factors are mutually independent. The experimental results on dataset Knowledge Discovery and Data Mining (KDDCup99) show that our method outperforms the existing intrusion detection methods. | |
dc.identifier.citation | WSEAS Transactions on Computers | |
dc.identifier.issn | 11092750 | |
dc.identifier.scopus | 2-s2.0-33744533060 | |
dc.identifier.uri | https://repository.dusit.ac.th//handle/123456789/5067 | |
dc.language | English | |
dc.rights.holder | Scopus | |
dc.subject | Anomaly detection | |
dc.subject | Independent component analysis | |
dc.subject | Intrusion detection system | |
dc.subject | Support Vector Machine | |
dc.title | An approach to solve computer attacks based on hybrid model | |
dc.type | Article | |
mods.location.url | https://www.scopus.com/inward/record.uri?eid=2-s2.0-33744533060&partnerID=40&md5=bed50b5edba81667b57da0961501e22c | |
oaire.citation.endPage | 1284 | |
oaire.citation.issue | 6 | |
oaire.citation.startPage | 1280 | |
oaire.citation.volume | 5 |