Study of the Possibility of Using the RBF Network to Detect U2R Category Network Attacks

VN Pakhomova, V Kulyk - 2022 - eadnurt.diit.edu.ua
VN Pakhomova, V Kulyk
2022eadnurt.diit.edu.ua
ENG: The" RBF_U2R" program based on the implementation of the RBF network, the
configuration of which is NMK (where N is the number of input neurons; M is the number of
basic functions; K is the number of resulting neurons) was created in Python for detecting the
following classes of attacks: Buffer_overflow; Loadmodule; Perl; Rootkit; Normal and using
network traffic parameters from the open KDDCup database. Studies of the accuracy
parameter were carried out during the training epochs of the neural network on the created …
ENG: The "RBF_U2R" program based on the implementation of the RBF network, the configuration of which is N-M-K (where N is the number of input neurons; M is the number of basic functions; K is the number of resulting neurons) was created in Python for detecting the following classes of attacks: Buffer_overflow; Loadmodule; Perl; Rootkit; Normal and using network traffic parameters from the open KDDCup database. Studies of the accuracy parameter were carried out during the training epochs of the neural network on the created program.
eadnurt.diit.edu.ua
Показан лучший результат поиска по этому запросу. Все результаты