The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

[PDF][PDF] Data mining methods for network intrusion detection

ST Brugger - University of California at Davis, 2004 - Citeseer
Network intrusion detection systems have become a standard component in security
infrastructures. Unfortunately, current systems are poor at detecting novel attacks without an …

[PDF][PDF] Data mining techniques for (network) intrusion detection systems

T Lappas, K Pelechrinis - … of Computer Science and Engineering UC …, 2007 - Citeseer
In Information Security, intrusion detection is the act of detecting actions that attempt to
compromise the confidentiality, integrity or availability of a resource. Intrusion detection does …

Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey

AS Subaira, P Anitha - 2014 IEEE 8th International Conference …, 2014 - ieeexplore.ieee.org
In spite of growing information system widely, security has remained one hard-hitting area
for computers as well as networks. In information protection, Intrusion Detection System …

Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of …

V Engen - 2010 - eprints.bournemouth.ac.uk
For the last decade it has become commonplace to evaluate machine learning techniques
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …

Evaluating the performance of a differential evolution algorithm in anomaly detection

S Elsayed, R Sarker, J Slay - 2015 IEEE Congress on …, 2015 - ieeexplore.ieee.org
During the last few eras, evolutionary algorithms have been adopted to tackle cyber-
terrorism. Among them, genetic algorithms and genetic programming were popular choices …

Survey of uses of evolutionary computation algorithms and swarm intelligence for network intrusion detection

S Elsayed, R Sarker, D Essam - International Journal of …, 2015 - World Scientific
Many infrastructures, such as those of finance and banking, transportation, military and
telecommunications, are highly dependent on the Internet. However, as the Internet's …

The spatial analysis of the malicious uniform resource locators (URLs): 2016 dataset case study

RW Amin, HE Sevil, S Kocak, G Francia III, P Hoover - Information, 2020 - mdpi.com
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks
directed at other countries. The cyber attack dataset was obtained from Canadian Institute …

A study of Intrusion Detection using data mining

M Moorthy, S Sathiyabama - IEEE-International Conference On …, 2012 - ieeexplore.ieee.org
Every enterprise wants to protect their data from both the internal and external attackers. In
this initiative firewall, encryption, and authentication serve as the first line of defense. And …

Multiple learning based classifiers using layered approach and Feature Selection for attack detection

T Subbulakshmi, AF Afroze - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
One of the major shares of the current security infrastructure is formed by the Intrusion
Detection Systems (IDS). The attack launched towards the security systems are increasing in …