Nature inspired techniques and applications in intrusion detection systems: Recent progress and updated perspective

K Thakur, G Kumar - Archives of Computational Methods in Engineering, 2021 - Springer
Nowadays, it has become a necessity for operational and reliable operation of networks due
to our increased dependency over the network services. However, intruders are …

Кибериммунология

СА Петренко - 2021 - elibrary.ru
Кибериммунология [от греч. κυβερνητκο′ ζ-рулевой, кормчий, лат. immunis–свободный,
избавленный и греч. λόγος-учение] это сравнительно новая наука об общих …

An intrusion detection system based on neural network

O Can, OK Sahingoz - 2015 23nd Signal Processing and …, 2015 - ieeexplore.ieee.org
In current time, cyber wars are added in military operation areas. Some measures reduce
amount of attacks but these measures can't block cyber attacks completely so it is important …

Abnormal traffic monitoring methods based on a cloud computing platform

H Shaohua, X Nanfeng - … on Cloud Computing and Big Data …, 2020 - ieeexplore.ieee.org
Every packet on the internet represents a traffic, and in addition to normal traffic, there are
many abnormal traffic, and the abnormal traffic may bring huge security risks to the security …

A fingerprint enhancement and second-order Markov chain based malicious encrypted traffic identification scheme

D Chao - Proceedings of the 2020 6th International Conference …, 2020 - dl.acm.org
Malicious encrypted traffic poses great threat to cyber security owing to encryption and the
ability to bypass traditional traffic detection schemes. Malicious encrypted traffic identification …

基于互信息和文化基因算法的网络流量特征选择

苗长胜, 原常青, 王兴伟, 常桂然 - 东北大学学报(自然科学版), 2014 - xuebao.neu.edu.cn
利用文化基因框架的引导, 提出一种结合了封装和过滤的混合型特征选择算法.
该算法在传统的遗传算法中采用了基于互信息的局部搜索算法, 全局搜索以分类器精度为适应度 …

IDS false alarm reduction using an instance selection KNN-memetic algorithm

A Miloud-Aouidate… - International Journal of …, 2013 - inderscienceonline.com
A K-nearest neighbours-based intrusion detection system uses a training set for
classification purpose. The size of this dataset is critical. In fact, if the dataset size is too …

Обнаружение сетевых вторжений эволюционным иммунным алгоритмом клональной селекции

ВГ Жуков, ТА Саламатова - Сибирский аэрокосмический журнал, 2014 - cyberleninka.ru
Предложено применение аппарата искусственных иммунных систем в качестве
эвристического метода обнаружения инцидентов информационной безопасности для …

The detection of network intrusion by evolutionary immune algorithm with clonal selection

VG Zhukov, TA Salamatova - Siberian Aerospace Journal, 2014 - ter-arkhiv.ru
In the paper the application of artificial immune systems as a heuristic detection method for
algorithmic information security incidents of intrusion detection systems is proposed. A …

Network intrusion detection by the coevolutionary immune algorithm of artificial immune systems with clonal selection

T Salamatova, V Zhukov - IOP Conference Series: Materials …, 2017 - iopscience.iop.org
The paper presents the application of the artificial immune systems apparatus as a heuristic
method of network intrusion detection for algorithmic provision of intrusion detection …