The use of computational intelligence in intrusion detection systems: A review
SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …
considerable interest from the research community. Characteristics of computational …
[PDF][PDF] Data mining methods for network intrusion detection
ST Brugger - University of California at Davis, 2004 - Citeseer
Network intrusion detection systems have become a standard component in security
infrastructures. Unfortunately, current systems are poor at detecting novel attacks without an …
infrastructures. Unfortunately, current systems are poor at detecting novel attacks without an …
[PDF][PDF] Data mining techniques for (network) intrusion detection systems
In Information Security, intrusion detection is the act of detecting actions that attempt to
compromise the confidentiality, integrity or availability of a resource. Intrusion detection does …
compromise the confidentiality, integrity or availability of a resource. Intrusion detection does …
Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey
In spite of growing information system widely, security has remained one hard-hitting area
for computers as well as networks. In information protection, Intrusion Detection System …
for computers as well as networks. In information protection, Intrusion Detection System …
Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of …
V Engen - 2010 - eprints.bournemouth.ac.uk
For the last decade it has become commonplace to evaluate machine learning techniques
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
Evaluating the performance of a differential evolution algorithm in anomaly detection
During the last few eras, evolutionary algorithms have been adopted to tackle cyber-
terrorism. Among them, genetic algorithms and genetic programming were popular choices …
terrorism. Among them, genetic algorithms and genetic programming were popular choices …
Survey of uses of evolutionary computation algorithms and swarm intelligence for network intrusion detection
Many infrastructures, such as those of finance and banking, transportation, military and
telecommunications, are highly dependent on the Internet. However, as the Internet's …
telecommunications, are highly dependent on the Internet. However, as the Internet's …
The spatial analysis of the malicious uniform resource locators (URLs): 2016 dataset case study
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks
directed at other countries. The cyber attack dataset was obtained from Canadian Institute …
directed at other countries. The cyber attack dataset was obtained from Canadian Institute …
A study of Intrusion Detection using data mining
M Moorthy, S Sathiyabama - IEEE-International Conference On …, 2012 - ieeexplore.ieee.org
Every enterprise wants to protect their data from both the internal and external attackers. In
this initiative firewall, encryption, and authentication serve as the first line of defense. And …
this initiative firewall, encryption, and authentication serve as the first line of defense. And …
Multiple learning based classifiers using layered approach and Feature Selection for attack detection
T Subbulakshmi, AF Afroze - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
One of the major shares of the current security infrastructure is formed by the Intrusion
Detection Systems (IDS). The attack launched towards the security systems are increasing in …
Detection Systems (IDS). The attack launched towards the security systems are increasing in …