dc.contributorBotto-Tobar M.
dc.contributorLeon-Acurio J.
dc.contributorDiaz Cadena A.
dc.contributorMontiel Diaz P.
dc.creatorÁlvarez Almeida L.A.
dc.creatorMartínez-Santos, Juan Carlos
dc.date.accessioned2020-03-26T16:33:04Z
dc.date.available2020-03-26T16:33:04Z
dc.date.created2020-03-26T16:33:04Z
dc.date.issued2020
dc.identifierAdvances in Intelligent Systems and Computing; Vol. 1067, pp. 380-389
dc.identifier9783030320324
dc.identifier21945357
dc.identifierhttps://hdl.handle.net/20.500.12585/9152
dc.identifier10.1007/978-3-030-32033-1_35
dc.identifierUniversidad Tecnológica de Bolívar
dc.identifierRepositorio UTB
dc.identifier57210565161
dc.identifier26325154200
dc.description.abstractIn the last few years, the Digital Services industry has grown tremendously, offering numerous services through the Internet and using a recent concept or business model called cloud computing. For this reason, new threats and cyber-attacks have appeared, such as Denial of Service attacks. Their main objective is to prevent legitimate users from accessing services (websites, online stores, blogs, social media, banking services, etc.) offered by different companies on the Internet. In addition, it produces collateral damage in host and web servers, for example, exhaustion of network bandwidth and computer resources of the victim. In this article, we will analyze the information contained in NSL-KDD data-set, which possesses important records about the several behaviors of network traffic. These will be selected to present two methods of selection of features that allow the selection of the most relevant attributes within the data set, to build an Intrusion Detection System. The attributes selected for this experiment will be of great help to train and test various kernels of the Support Vector Machine. Once the model has been tested, an evaluation of the classification model will be performed using the cross-validation technique and we finally can choose the best classifier. © 2020, Springer Nature Switzerland AG.
dc.languageeng
dc.publisherSpringer
dc.relation29 May 2019 through 31 May 2019
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rightsinfo:eu-repo/semantics/restrictedAccess
dc.rightsAtribución-NoComercial 4.0 Internacional
dc.sourcehttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85075841900&doi=10.1007%2f978-3-030-32033-1_35&partnerID=40&md5=41f83505d6bd21f43683a89bc481d6af
dc.source1st International Conference on Advances in Emerging Trends and Technologies, ICAETT 2019
dc.titleSIDS-DDoS, a Smart Intrusion Detection System for Distributed Denial of Service Attacks


Este ítem pertenece a la siguiente institución