A detailed investigation and analysis of using machine learning techniques for intrusion detection
P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …
significant number of techniques have been developed which are based on machine …
[PDF][PDF] Intrusion detection system using genetic algorithm and data mining: An overview
VK Kshirsagar, SM Tidke, S Vishnu - International Journal of …, 2012 - researchgate.net
Network security is of primary concerned now days for large organizations. Various types of
Intrusion Detection Systems (IDS) are available in the market like Host based, Network …
Intrusion Detection Systems (IDS) are available in the market like Host based, Network …
[PDF][PDF] Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm
S Paliwal, R Gupta - International Journal of Computer Applications, 2012 - Citeseer
Nowadays it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organizations. But secured data …
communication of information between various organizations. But secured data …
New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm
Cloud computing is distributed architecture, providing computing facilities and storage
resource as a service over an open environment (Internet), this lead to different matters …
resource as a service over an open environment (Internet), this lead to different matters …
A hybrid approach for network intrusion detection
GP Rout, SN Mohanty - 2015 Fifth International Conference on …, 2015 - ieeexplore.ieee.org
An Intrusion detection system (IDS) monitors network traffic and system activities and report
to administrator. In some cases the intrusion detection may also respond to anomalous or …
to administrator. In some cases the intrusion detection may also respond to anomalous or …
Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of …
V Engen - 2010 - eprints.bournemouth.ac.uk
For the last decade it has become commonplace to evaluate machine learning techniques
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
[PDF][PDF] Fitness function for genetic algorithm used in intrusion detection system
F Alabsi, R Naoum - International Journal of Applied Science and …, 2012 - academia.edu
Computer network usage increased rapidly at the last decades, the intruders tried to satisfy
their needs by many types of attack depending on the intruder objectives, this encourage the …
their needs by many types of attack depending on the intruder objectives, this encourage the …
[PDF][PDF] Feasibility of intrusion detection system with high performance computing: A survey
Security has been the major concern in every aspect of our daily life. New methods and
equipments have been devised to ensure privacy. Similarly, computer network is the field …
equipments have been devised to ensure privacy. Similarly, computer network is the field …
Classification of cyber attacks based on rough set theory
The rapidly rising usage of telecommunication and information networks which inter-connect
modern society through computers, smart phones and other electronic devices has led to …
modern society through computers, smart phones and other electronic devices has led to …
Survey of uses of evolutionary computation algorithms and swarm intelligence for network intrusion detection
Many infrastructures, such as those of finance and banking, transportation, military and
telecommunications, are highly dependent on the Internet. However, as the Internet's …
telecommunications, are highly dependent on the Internet. However, as the Internet's …