[PDF][PDF] Survey on intrusion detection system using data mining techniques

A Sahasrabuddhe, S Naikade, A Ramaswamy… - Int. Res. J. Eng …, 2017 - academia.edu
Intrusion Detection System (IDS) has started becoming part and parcel of every system
considering the growing security breaches in the cyber world. Security threat means …

[PDF][PDF] Impact of features reduction on machine learning based intrusion detection systems.

M Fatima, O Rehman, IMH Rahman - EAI Endorsed Trans. Scalable …, 2022 - academia.edu
INTRODUCTION: As the use of the internet is increasing rapidly, cyber-attacks over user's
personal data and network resources are on the rise. Due to the easily accessible cyber …

Ant tree miner amyntas: Automatic, cost-based feature selection for intrusion detection

FH Botes, L Leenen, R de La Harpe - Journal of Information Warfare, 2017 - JSTOR
Intrusion Detection Systems (IDSs) analyse network traffic to identify suspicious patterns
which indicate the intention to compromise the system. Traditional detection methods are …

A hybrid behavioural-based cyber intrusion detection system

A Adhanom, HM Melaku - International Journal of …, 2019 - inderscienceonline.com
The experience of deploying intrusion detection system (IDS) for securing computer system
is being matured. There are knowledge-based (misuse) and anomaly IDS. In knowledge …