dc.date.accessioned |
2021-06-03T11:02:17Z |
|
dc.date.available |
2021-06-03T11:02:17Z |
|
dc.date.issued |
2021 |
|
dc.identifier.issn |
1024-123X |
|
dc.identifier.uri |
https://www.doi.org/10.1155/2021/6639714 |
|
dc.identifier.uri |
https://hdl.handle.net/20.500.12619/95435 |
|
dc.description |
Bu yayın 06.11.1981 tarihli ve 17506 sayılı Resmî Gazete’de yayımlanan 2547 sayılı Yükseköğretim Kanunu’nun 4/c, 12/c, 42/c ve 42/d maddelerine dayalı 12/12/2019 tarih, 543 sayılı ve 05 numaralı Üniversite Senato Kararı ile hazırlanan Sakarya Üniversitesi Açık Bilim ve Açık Akademik Arşiv Yönergesi gereğince açık akademik arşiv sistemine açık erişim olarak yüklenmiştir. |
|
dc.description |
Bu yayın 06.11.1981 tarihli ve 17506 sayılı Resmî Gazete’de yayımlanan 2547 sayılı Yükseköğretim Kanunu’nun 4/c, 12/c, 42/c ve 42/d maddelerine dayalı 12/12/2019 tarih, 543 sayılı ve 05 numaralı Üniversite Senato Kararı ile hazırlanan Sakarya Üniversitesi Açık Bilim ve Açık Akademik Arşiv Yönergesi gereğince açık akademik arşiv sistemine açık erişim olarak yüklenmiştir. |
|
dc.description.abstract |
With the expansion of communication in today's world and the possibility of creating interactions between people through communication networks regardless of the distance dimension, the issue of creating security for the data and information exchanged has received much attention from researchers. Various methods have been proposed for this purpose; one of the most important methods is intrusion detection systems to quickly detect intrusions into the network and inform the manager or responsible people to carry out an operational set to reduce the amount of damage caused by these intruders. The main challenge of the proposed intrusion detection systems is the number of erroneous warning messages generated and the low percentage of accurate detection of intrusions in them. In this research, the Suricata IDS/IPS is deployed along with the NN model for the metaheuristic's manual detection of malicious traffic in the targeted network. For the metaheuristic-based feature selection, the neural network, and the anomaly-based detection, the fuzzy logic is used in this research paper. The latest stable version of Kali Linux 2020.3 is used as an attacking system for web applications and different types of operating systems. The proposed method has achieved 96.111% accuracy for detecting network intrusion. |
|
dc.language |
English |
|
dc.language.iso |
eng |
|
dc.publisher |
HINDAWI LTD |
|
dc.relation.isversionof |
10.1155/2021/6639714 |
|
dc.rights |
info:eu-repo/semantics/openAccess |
|
dc.title |
The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems |
|
dc.type |
Article |
|
dc.identifier.volume |
2021 |
|
dc.relation.journal |
MATHEMATICAL PROBLEMS IN ENGINEERING |
|
dc.identifier.wos |
WOS:000631898300009 |
|
dc.identifier.doi |
10.1155/2021/6639714 |
|
dc.identifier.eissn |
1563-5147 |
|
dc.contributor.author |
Einy, Sajad |
|
dc.contributor.author |
Oz, Cemil |
|
dc.contributor.author |
Navaei, Yahya Dorostkar |
|
dc.relation.publicationcategory |
Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı |
|
dc.rights.openaccessdesignations |
DOAJ Gold, Green Published |
|