Intelligent feature selection and classification techniques for intrusion detection in networks: a survey

S Ganapathy, K Kulothungan, S Muthurajkumar… - EURASIP Journal on …, 2013 - Springer
Rapid growth in the Internet usage and diverse military applications have led researchers to
think of intelligent systems that can assist the users and applications in getting the services …

Clustering-based network intrusion detection

S Zhong, TM Khoshgoftaar, N Seliya - International Journal of …, 2007 - World Scientific
Recently data mining methods have gained importance in addressing network security
issues, including network intrusion detection—a challenging task in network security …

Inteligencia artificial al servicio de la auditoría: una revisión sistemática de literatura

AYM Hernandez, FJV Duque - Revista Ibérica de Sistemas e …, 2020 - search.proquest.com
Applying artificial intelligence techniques in the field of auditing promises to be an effective
strategy when improving efficiency and productivity in these processes and therefore in the …

General study of intrusion detection system and survey of agent based intrusion detection system

AK Saxena, S Sinha, P Shukla - 2017 International conference …, 2017 - ieeexplore.ieee.org
In today's world one of the most severe threat to computer security is the illegal intrusion into
a computer system. As the network applications are growing rapidly, new sort of network …

Biological feature selection and classification techniques for intrusion detection on BAT

S Narayanasami, S Sengan, S Khurram… - Wireless personal …, 2022 - Springer
Privacy is a significant problem in communications networks. As a factor, trustworthy
knowledge sharing in computer networks is essential. Intrusion Detection Systems consist of …

Hybrid Modified K‐Means with C4.5 for Intrusion Detection Systems in Multiagent Systems

W Laftah Al-Yaseen, Z Ali Othman… - The Scientific World …, 2015 - Wiley Online Library
Presently, the processing time and performance of intrusion detection systems are of great
importance due to the increased speed of traffic data networks and a growing number of …

[PDF][PDF] Evaluation of k-means clustering for effective intrusion detection and prevention in massive network traffic data

K Nalavade, BB Meshram - International Journal of Computer …, 2014 - academia.edu
With the growth of hacking and exploiting tools and invention of new ways of intrusion,
Intrusion detection and prevention is becoming the major challenge in the world of network …

A distributed intrusion detection system based on agents

J Liu, L Li - 2008 IEEE Pacific-Asia Workshop on …, 2008 - ieeexplore.ieee.org
Due to the rapid growth of the network application, new kinds of network attacks are
emerging endlessly. So it is critical to protect the networks from attackers and the intrusion …

A security model for detecting suspicious patterns in physical environment

S Fong, Z Yan - Third International Symposium on Information …, 2007 - ieeexplore.ieee.org
In the view of escalating global threat in security, it is imperative to have an automated
detection system that can pick up suspicious patterns of human movement in physical …

Conceptual modeling rules extracting for data streams

XD Zhu, ZQ Huang - Knowledge-Based Systems, 2008 - Elsevier
Data take the form of continuous data streams rather than traditional stored databases in a
growing number of applications, including network traffic monitoring, network intrusion …