A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

[PDF][PDF] Intrusion detection system using genetic algorithm and data mining: An overview

VK Kshirsagar, SM Tidke, S Vishnu - International Journal of …, 2012 - researchgate.net
Network security is of primary concerned now days for large organizations. Various types of
Intrusion Detection Systems (IDS) are available in the market like Host based, Network …

[PDF][PDF] Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm

S Paliwal, R Gupta - International Journal of Computer Applications, 2012 - Citeseer
Nowadays it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organizations. But secured data …

New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm

Z Chiba, N Abghour, K Moussaid… - International Journal …, 2019 - search.proquest.com
Cloud computing is distributed architecture, providing computing facilities and storage
resource as a service over an open environment (Internet), this lead to different matters …

A hybrid approach for network intrusion detection

GP Rout, SN Mohanty - 2015 Fifth International Conference on …, 2015 - ieeexplore.ieee.org
An Intrusion detection system (IDS) monitors network traffic and system activities and report
to administrator. In some cases the intrusion detection may also respond to anomalous or …

Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of …

V Engen - 2010 - eprints.bournemouth.ac.uk
For the last decade it has become commonplace to evaluate machine learning techniques
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …

[PDF][PDF] Fitness function for genetic algorithm used in intrusion detection system

F Alabsi, R Naoum - International Journal of Applied Science and …, 2012 - academia.edu
Computer network usage increased rapidly at the last decades, the intruders tried to satisfy
their needs by many types of attack depending on the intruder objectives, this encourage the …

[PDF][PDF] Feasibility of intrusion detection system with high performance computing: A survey

S Beg, U Naru, M Ashraf, S Mohsin - Int. J. Advances in Computer …, 2010 - academia.edu
Security has been the major concern in every aspect of our daily life. New methods and
equipments have been devised to ensure privacy. Similarly, computer network is the field …

Classification of cyber attacks based on rough set theory

A Amin, S Anwar, A Adnan, MA Khan… - 2015 First International …, 2015 - ieeexplore.ieee.org
The rapidly rising usage of telecommunication and information networks which inter-connect
modern society through computers, smart phones and other electronic devices has led to …

Survey of uses of evolutionary computation algorithms and swarm intelligence for network intrusion detection

S Elsayed, R Sarker, D Essam - International Journal of …, 2015 - World Scientific
Many infrastructures, such as those of finance and banking, transportation, military and
telecommunications, are highly dependent on the Internet. However, as the Internet's …