Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS)

Bisyron Wahyudi Masduki, Kalamullah Ramli, Ferry Astika Saputra, Dedy Sugiarto

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Citations (Scopus)

Abstract

Many computer-based devices are now connected to the internet technology. These devices are widely used to manage critical infrastructure such energy, aviation, mining, banking and transportation. The strategic value of the data and the information transmitted over the Internet infrastructure has a very high economic value. With the increasing value of the data and the information, the higher the threats and attacks on such data and information. Statistical data shows a significant increase in threats to cyber security. The Government is aware of the threats to cyber security and respond to cyber security system that can perform early detection of threats and attacks the internet.

Original languageEnglish
Title of host publication14th International Conference on QiR (Quality in Research), QiR 2015 - In conjunction with 4th Asian Symposium on Material Processing, ASMP 2015 and International Conference in Saving Energy in Refrigeration and Air Conditioning, ICSERA 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages56-64
Number of pages9
ISBN (Electronic)9781479965519
DOIs
Publication statusPublished - 7 Jan 2016
Event14th International Conference on QiR (Quality in Research), QiR 2015 - Lombok, Indonesia
Duration: 10 Aug 201513 Aug 2015

Publication series

Name14th International Conference on QiR (Quality in Research), QiR 2015 - In conjunction with 4th Asian Symposium on Material Processing, ASMP 2015 and International Conference in Saving Energy in Refrigeration and Air Conditioning, ICSERA 2015

Conference

Conference14th International Conference on QiR (Quality in Research), QiR 2015
Country/TerritoryIndonesia
CityLombok
Period10/08/1513/08/15

Keywords

  • attack
  • intrusion detection system
  • machine-learning
  • support vector machine
  • threat

Fingerprint

Dive into the research topics of 'Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS)'. Together they form a unique fingerprint.

Cite this