Intrusion detection by machine learning: A review
CF Tsai, YF Hsu, CY Lin, WY Lin - expert systems with applications, 2009 - Elsevier
The popularity of using Internet contains some risks of network attacks. Intrusion detection is
one major research problem in network security, whose aim is to identify unusual access or …
one major research problem in network security, whose aim is to identify unusual access or …
The use of computational intelligence in intrusion detection systems: A review
SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …
considerable interest from the research community. Characteristics of computational …
Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …
proliferation in the number of Internet users has presented attackers with new detrimental …
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
WC Lin, SW Ke, CF Tsai - Knowledge-based systems, 2015 - Elsevier
The aim of an intrusion detection systems (IDS) is to detect various types of malicious
network traffic and computer usage, which cannot be detected by a conventional firewall …
network traffic and computer usage, which cannot be detected by a conventional firewall …
Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives
A Divekar, M Parekh, V Savla… - 2018 IEEE 3rd …, 2018 - ieeexplore.ieee.org
Machine Learning has been steadily gaining traction for its use in Anomaly-based Network
Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed …
Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed …
A triangle area based nearest neighbors approach to intrusion detection
CF Tsai, CY Lin - Pattern recognition, 2010 - Elsevier
Intrusion detection is a necessary step to identify unusual access or attacks to secure
internal networks. In general, intrusion detection can be approached by machine learning …
internal networks. In general, intrusion detection can be approached by machine learning …
A local search-based non-dominated sorting genetic algorithm for solving a multi-objective medical tourism trip design problem considering the attractiveness of trips
Nowadays, the medical tourism industry encourages many healthcare practitioners to
provide high-quality and low-cost medical services for patients worldwide. The development …
provide high-quality and low-cost medical services for patients worldwide. The development …
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
The deployment of wireless sensor networks and mobile ad-hoc networks in applications
such as emergency services, warfare and health monitoring poses the threat of various …
such as emergency services, warfare and health monitoring poses the threat of various …
Applications in security and evasions in machine learning: a survey
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …
privacy in various applications. ML is used to address serious issues such as real-time …
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
MY Su, GJ Yu, CY Lin - Computers & security, 2009 - Elsevier
None of the previously proposed Network Intrusion Detection Systems (NIDSs), which are
subject to fuzzy association rules, can meet real-time requirements because they all apply …
subject to fuzzy association rules, can meet real-time requirements because they all apply …