[HTML][HTML] Feature selection for intrusion detection using random forest

MAM Hasan, M Nasser, S Ahmad, KI Molla - Journal of information security, 2016 - scirp.org
An intrusion detection system collects and analyzes information from different areas within a
computer or a network to identify possible security threats that include threats from both …

[HTML][HTML] Support vector machine and random forest modeling for intrusion detection system (IDS)

MAM Hasan, M Nasser, B Pal, S Ahmad - Journal of Intelligent Learning …, 2014 - scirp.org
The success of any Intrusion Detection System (IDS) is a complicated problem due to its
nonlinearity and the quantitative or qualitative network traffic data stream with many features …

[PDF][PDF] Network intrusion detection system using fuzzy logic

R Shanmugavadivu, N Nagarajan - Indian Journal of Computer Science …, 2011 - Citeseer
ABSTRACT IDS which are increasingly a key part of system defense are used to identify
abnormal activities in a computer system. In general, the traditional intrusion detection relies …

[PDF][PDF] Network intrusion detection based on rough set and k-nearest neighbour

AO Adetunmbi, SO Falaki, OS Adewale… - International Journal of …, 2008 - researchgate.net
Increasing numbers of interconnected networks to the internet have led to an increase in
cyber attacks which necessitates the need for an effective intrusion detection system. In this …

Hybrid intelligent systems for detecting network intrusions

M Panda, A Abraham, MR Patra - Security and Communication …, 2015 - Wiley Online Library
This paper intends to develop some novel hybrid intelligent systems by combining naïve
Bayes with decision trees (NBDT) and by combining non‐nested generalized exemplar …

基于SMOTE 和GBDT 的网络入侵检测方法研究.

封化民, 李明伟, 侯晓莲… - Application Research of …, 2017 - search.ebscohost.com
现有的基于机器学习的入侵检测方法大多专注于提高整体检测率和降低整体的漏报率,
忽视了少数类别的检测率和漏报率, 为此, 提出了一种基于SmOTE …

[PDF][PDF] On the KDD'99 dataset: support vector machine based intrusion detection system (ids) with different kernels

M Al Mehedi Hasan, M Nasser… - Int. J. Electron. Commun …, 2013 - researchgate.net
(IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative
network traffic data stream with many features. To get rid of this problem, several types of …

Detection of network intrusions using hybrid intelligent systems

A Bhumgara, A Pitale - 2019 1st International Conference on …, 2019 - ieeexplore.ieee.org
With the advancement in technology, our society has become so dependent on the internet
and the number of internet users keeps rising each day. However, with the increased users …

Intrusion detection system enhanced by hierarchical bidirectional fuzzy rule interpolation

S Jin, Y Jiang, J Peng - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
Intrusion detection system (IDS) is used to find malicious connections and protect networks
from external or internal attacks. Various fuzzy or fuzzy intelligence approaches have been …

[PDF][PDF] Performance evaluation of different kernels for support vector machine used in intrusion detection system

MAM Hasan, S Xu, MMJ Kabir… - International Journal of …, 2016 - academia.edu
The success of any Intrusion Detection System (IDS) is a complicated problem due to its
nonlinearity and the quantitative or qualitative network traffic data stream with numerous …