Search Results - (( attack detection using algorithm ) OR ( based optimization based algorithm ))
Search alternatives:
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
3
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
4
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
5
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
6
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
7
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
9
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Article -
10
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
11
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…This situation makes the detection of cyber-based attacks on computer networks a relevant and challenging area of research. …”
Get full text
Get full text
Thesis -
12
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. …”
Get full text
Get full text
Get full text
Article -
13
Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network
Published 2021“…Due to these surges in spam attacks, a number of approaches have been proposed to lessen the attacks across the globe significantly. …”
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
15
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
16
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
17
-
18
A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review
Published 2024journal::journal article -
19
A new intrusion detection system based on fast learning network and particle swarm optimization
Published 2018“…Supervised Intrusion Detection System is a system that has the capability of learning from examples about previous attacks to detect new attacks. …”
Get full text
Get full text
Get full text
Article -
20
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis
