Mostrar el registro sencillo del ítem
dc.contributor | Escuela de Ingenierias Industrial e Informatica | es_ES |
dc.contributor.author | Pérez, Daniel | |
dc.contributor.author | Alonso Castro, Serafín | |
dc.contributor.author | Morán Palao, Antonio | |
dc.contributor.author | Prada Medrano, Miguel Ángel | |
dc.contributor.author | Fuertes Martínez, Juan José | |
dc.contributor.author | Domínguez, Manuel | |
dc.contributor.other | Ingenieria de Sistemas y Automatica | es_ES |
dc.date | 2019 | |
dc.date.accessioned | 2019-11-04T18:08:23Z | |
dc.date.available | 2019-11-04T18:08:23Z | |
dc.identifier.citation | International Conference on Engineering Applications of Neural Networks, 2019 | es_ES |
dc.identifier.issn | 1865-0929 | |
dc.identifier.uri | http://hdl.handle.net/10612/11293 | |
dc.description | P. 463-475 | es_ES |
dc.description.abstract | Intrusion detection is essential for the security of the components of any network. For that reason, several strategies can be used in Intrusion Detection Systems (IDS) to identify the increasing attempts to gain unauthorized access with malicious purposes including those base on machine learning. Anomaly detection has been applied successfully to numerous domains and might help to identify unknown attacks. However, there are existing issues such as high error rates or large dimensionality of data that make its deployment di cult in real-life scenarios. Representation learning allows to estimate new latent features of data in a low-dimensionality space. In this work, anomaly detection is performed using a previous feature learning stage in order to compare these methods for the detection of intrusions in network tra c. For that purpose, four di erent anomaly detection algorithms are applied to recent network datasets using two di erent feature learning methods such as principal component analysis and autoencoders. Several evaluation metrics such as accuracy, F1 score or ROC curves are used for comparing their performance. The experimental results show an improvement for two of the anomaly detection methods using autoencoder and no signi cant variations for the linear feature transformation | es_ES |
dc.language | eng | es_ES |
dc.publisher | Springer | es_ES |
dc.subject | Ingeniería de sistemas | es_ES |
dc.subject.other | Anomaly detection | es_ES |
dc.subject.other | Feature representation | es_ES |
dc.subject.other | Network intrusion detection | es_ES |
dc.title | Comparison of Network Intrusion Detection Performance Using Feature Representation | es_ES |
dc.type | info:eu-repo/semantics/article | es_ES |
dc.identifier.doi | 10.1007/978-3-030-20257-6_40 | |
dc.description.peerreviewed | SI | es_ES |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es_ES |
dc.identifier.essn | 1865-0937 | |
dc.journal.title | International Conference on Engineering Applications of Neural Networks | es_ES |
dc.page.initial | 463 | es_ES |
dc.page.final | 475 | es_ES |
dc.type.hasVersion | info:eu-repo/semantics/acceptedVersion | es_ES |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Artículos [4589]