Açık Akademik Arşiv Sistemi

The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems

Show simple item record

dc.date.accessioned 2021-06-03T11:02:17Z
dc.date.available 2021-06-03T11:02:17Z
dc.date.issued 2021
dc.identifier.issn 1024-123X
dc.identifier.uri https://www.doi.org/10.1155/2021/6639714
dc.identifier.uri https://hdl.handle.net/20.500.12619/95435
dc.description Bu yayın 06.11.1981 tarihli ve 17506 sayılı Resmî Gazete’de yayımlanan 2547 sayılı Yükseköğretim Kanunu’nun 4/c, 12/c, 42/c ve 42/d maddelerine dayalı 12/12/2019 tarih, 543 sayılı ve 05 numaralı Üniversite Senato Kararı ile hazırlanan Sakarya Üniversitesi Açık Bilim ve Açık Akademik Arşiv Yönergesi gereğince açık akademik arşiv sistemine açık erişim olarak yüklenmiştir.
dc.description Bu yayın 06.11.1981 tarihli ve 17506 sayılı Resmî Gazete’de yayımlanan 2547 sayılı Yükseköğretim Kanunu’nun 4/c, 12/c, 42/c ve 42/d maddelerine dayalı 12/12/2019 tarih, 543 sayılı ve 05 numaralı Üniversite Senato Kararı ile hazırlanan Sakarya Üniversitesi Açık Bilim ve Açık Akademik Arşiv Yönergesi gereğince açık akademik arşiv sistemine açık erişim olarak yüklenmiştir.
dc.description.abstract With the expansion of communication in today's world and the possibility of creating interactions between people through communication networks regardless of the distance dimension, the issue of creating security for the data and information exchanged has received much attention from researchers. Various methods have been proposed for this purpose; one of the most important methods is intrusion detection systems to quickly detect intrusions into the network and inform the manager or responsible people to carry out an operational set to reduce the amount of damage caused by these intruders. The main challenge of the proposed intrusion detection systems is the number of erroneous warning messages generated and the low percentage of accurate detection of intrusions in them. In this research, the Suricata IDS/IPS is deployed along with the NN model for the metaheuristic's manual detection of malicious traffic in the targeted network. For the metaheuristic-based feature selection, the neural network, and the anomaly-based detection, the fuzzy logic is used in this research paper. The latest stable version of Kali Linux 2020.3 is used as an attacking system for web applications and different types of operating systems. The proposed method has achieved 96.111% accuracy for detecting network intrusion.
dc.language English
dc.language.iso eng
dc.publisher HINDAWI LTD
dc.relation.isversionof 10.1155/2021/6639714
dc.rights info:eu-repo/semantics/openAccess
dc.title The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems
dc.type Article
dc.identifier.volume 2021
dc.relation.journal MATHEMATICAL PROBLEMS IN ENGINEERING
dc.identifier.wos WOS:000631898300009
dc.identifier.doi 10.1155/2021/6639714
dc.identifier.eissn 1563-5147
dc.contributor.author Einy, Sajad
dc.contributor.author Oz, Cemil
dc.contributor.author Navaei, Yahya Dorostkar
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rights.openaccessdesignations DOAJ Gold, Green Published


Files in this item

This item appears in the following Collection(s)

Show simple item record