Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research

R Panigrahi, S Borah, AK Bhoi, MF Ijaz, M Pramanik… - Mathematics, 2021 - mdpi.com
Supervised learning and pattern recognition is a crucial area of research in information
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …

A hybrid network intrusion detection system using simplified swarm optimization (SSO)

YY Chung, N Wahid - Applied soft computing, 2012 - Elsevier
The network intrusion detection techniques are important to prevent our systems and
networks from malicious behaviors. However, traditional network intrusion prevention such …

A comparative study of classification techniques for intrusion detection

H Chauhan, V Kumar, S Pundir… - … on Computational and …, 2013 - ieeexplore.ieee.org
Intrusion detection is one of the major research problems in network security. It is the
process of monitoring and analyzing network traffic data to detect security violations. Mining …

[PDF][PDF] Intrusion detection using machine learning and feature selection

HM Prachi, P Sharma - International Journal of Computer Network …, 2019 - academia.edu
Intrusion Detection is one of the most common approaches used in detecting malicious
activities in any network by analyzing its traffic. Machine Learning (ML) algorithms help to …

[HTML][HTML] Artificial intelligence and machine learning-based decision support system for forecasting electric vehicles' power requirement

SK Jauhar, S Sethi, SS Kamble, S Mathew… - … Forecasting and Social …, 2024 - Elsevier
Increasing pollution is causing adverse environmental effects, leading to increased interest
in combating this issue. There has been a significant interest in minimizing the pollution …

Intrusion detection system using bayesian network and hidden markov model

N Devarakonda, S Pamidi, VV Kumari… - Procedia Technology, 2012 - Elsevier
Across the globe, billions of dollars are spending every year to provide security to the
network systems to prevent the intrusions. Some consider the disruption of the vital systems …

Detecting denial of service attacks in the cloud

R Kumar, SP Lal, A Sharma - 2016 IEEE 14th Intl Conf on …, 2016 - ieeexplore.ieee.org
In this paper, an approach to protecting virtual machines (VMs) against denial of service
(DoS) attacks in a cloud environment is proposed. An open source cloud computing platform …

[PDF][PDF] Effective intrusion detection system using data mining technique

J Patel, K Panchal - Journal of Emerging Technologies and …, 2015 - researchgate.net
Network Security has become the key foundation with the tremendous increase in usage of
network-based services and information sharing on networks. Intrusion poses a serious risk …

Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system

M Albayati, B Issac - International Journal of Computational …, 2015 - Taylor & Francis
In this paper we discuss and analyze some of the intelligent classifiers which allows for
automatic detection and classification of networks attacks for any intrusion detection system …

Relevant feature selection model using data mining for intrusion detection system

AI Madbouly, AM Gody, TM Barakat - arXiv preprint arXiv:1403.7726, 2014 - arxiv.org
Network intrusions have become a significant threat in recent years as a result of the
increased demand of computer networks for critical systems. Intrusion detection system …