Search Results - (( based intrusion selection algorithm ) OR ( java application interface algorithm ))
Search alternatives:
- intrusion selection »
- selection algorithm »
- java application »
- based intrusion »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
3
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
4
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
5
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
6
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. …”
Get full text
Get full text
Thesis -
8
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
9
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…In order to improve classification performance problem, feature selection and discretization algorithm are crucial in selecting relevant attributes that could improve classification performance. …”
Get full text
Get full text
Thesis -
10
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
12
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
13
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
14
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. Traditional intrusion detection techniques have had trouble dealing with dynamic environments. …”
Get full text
Get full text
Get full text
Thesis -
15
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
16
A Review on feature selection and ensemble techniques for intrusion detection system
Published 2021“…We then analyze and discuss a variety of IDS-based machine learning techniques with various detection models (single classifier-based or ensemble-based), to illustrate their significance and success in the intrusion detection area. …”
Get full text
Get full text
Article -
17
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
18
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…In this study, the most significant features for enhancing the IDS efficiency and creating a smaller dataset in order to reduce the execution time for detecting attacks are selected from the sizeable network dataset. This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
19
A study on advanced statistical analysis for network anomaly detection
Published 2005“…This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. …”
Get full text
Monograph -
20
Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification
Published 2021“…The classifier, named as HADMLP is trained using a hybridization of the artificial bee colony along with the dragonfly algorithm. A multi-objective artificial bee colony model which is wrapper-based is used for selection of feature. …”
Get full text
Get full text
Conference or Workshop Item
