Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research
Supervised learning and pattern recognition is a crucial area of research in information
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
The network intrusion detection techniques are important to prevent our systems and
networks from malicious behaviors. However, traditional network intrusion prevention such …
networks from malicious behaviors. However, traditional network intrusion prevention such …
A comparative study of classification techniques for intrusion detection
Intrusion detection is one of the major research problems in network security. It is the
process of monitoring and analyzing network traffic data to detect security violations. Mining …
process of monitoring and analyzing network traffic data to detect security violations. Mining …
[PDF][PDF] Intrusion detection using machine learning and feature selection
Intrusion Detection is one of the most common approaches used in detecting malicious
activities in any network by analyzing its traffic. Machine Learning (ML) algorithms help to …
activities in any network by analyzing its traffic. Machine Learning (ML) algorithms help to …
[HTML][HTML] Artificial intelligence and machine learning-based decision support system for forecasting electric vehicles' power requirement
Increasing pollution is causing adverse environmental effects, leading to increased interest
in combating this issue. There has been a significant interest in minimizing the pollution …
in combating this issue. There has been a significant interest in minimizing the pollution …
Intrusion detection system using bayesian network and hidden markov model
Across the globe, billions of dollars are spending every year to provide security to the
network systems to prevent the intrusions. Some consider the disruption of the vital systems …
network systems to prevent the intrusions. Some consider the disruption of the vital systems …
Detecting denial of service attacks in the cloud
In this paper, an approach to protecting virtual machines (VMs) against denial of service
(DoS) attacks in a cloud environment is proposed. An open source cloud computing platform …
(DoS) attacks in a cloud environment is proposed. An open source cloud computing platform …
[PDF][PDF] Effective intrusion detection system using data mining technique
J Patel, K Panchal - Journal of Emerging Technologies and …, 2015 - researchgate.net
Network Security has become the key foundation with the tremendous increase in usage of
network-based services and information sharing on networks. Intrusion poses a serious risk …
network-based services and information sharing on networks. Intrusion poses a serious risk …
Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
M Albayati, B Issac - International Journal of Computational …, 2015 - Taylor & Francis
In this paper we discuss and analyze some of the intelligent classifiers which allows for
automatic detection and classification of networks attacks for any intrusion detection system …
automatic detection and classification of networks attacks for any intrusion detection system …
Relevant feature selection model using data mining for intrusion detection system
AI Madbouly, AM Gody, TM Barakat - arXiv preprint arXiv:1403.7726, 2014 - arxiv.org
Network intrusions have become a significant threat in recent years as a result of the
increased demand of computer networks for critical systems. Intrusion detection system …
increased demand of computer networks for critical systems. Intrusion detection system …