Search Results - (( attack detection selection algorithm ) OR ( java application optimized algorithm ))

Refine Results
  1. 1

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
    Get full text
    Get full text
    Article
  3. 3

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Adaptive feature selection for denial of services (DoS) attack by Yusof, Ahmad Riza'ain, Udzir, Nur Izura, Selamat, Ali, Hamdan, Hazlina, Abdullah @ Selimun, Mohd Taufik

    Published 2017
    “…In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Distributed Denial of Service detection using hybrid machine learning technique by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
    Get full text
    Conference or Workshop Item
  11. 11

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Bio-inspired for Features Optimization and Malware Detection by Mohd Faizal, Ab Razak, Nor Badrul, Anuar, Fazidah, Othman, Ahmad, Firdaus, Firdaus, Afifi, Rosli, Salleh

    Published 2018
    “…This paper aims to evaluate the effectiveness of the machine learning approach for detecting Android malware. In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  14. 14

    Bio-inspired for Features Optimization and Malware Detection by Razak, Mohd Faizal Ab, Anuar, Nor Badrul, Othman, Fazidah, Firdaus, Ahmad, Afifi, Firdaus, Salleh, Rosli

    Published 2018
    “…This paper aims to evaluate the effectiveness of the machine learning approach for detecting Android malware. In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. …”
    Get full text
    Get full text
    Article
  15. 15

    An efficient detection model of selective forwarding attacks in wireless mesh networks by Khanam, Shapla, Saleem, Habibullah Yusuf, Pathan, Al-Sakib Khan

    Published 2012
    “…In our approach, we also propose a multi-hop acknowledgement based algorithm to analyze and detect the malicious behavior to defend against selective forwarding attacks in WMNs. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  17. 17

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
    Get full text
    Get full text
    Get full text
    Article