Intrusion detection by machine learning: A review

CF Tsai, YF Hsu, CY Lin, WY Lin - expert systems with applications, 2009 - Elsevier
The popularity of using Internet contains some risks of network attacks. Intrusion detection is
one major research problem in network security, whose aim is to identify unusual access or …

The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

WC Lin, SW Ke, CF Tsai - Knowledge-based systems, 2015 - Elsevier
The aim of an intrusion detection systems (IDS) is to detect various types of malicious
network traffic and computer usage, which cannot be detected by a conventional firewall …

Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives

A Divekar, M Parekh, V Savla… - 2018 IEEE 3rd …, 2018 - ieeexplore.ieee.org
Machine Learning has been steadily gaining traction for its use in Anomaly-based Network
Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed …

A triangle area based nearest neighbors approach to intrusion detection

CF Tsai, CY Lin - Pattern recognition, 2010 - Elsevier
Intrusion detection is a necessary step to identify unusual access or attacks to secure
internal networks. In general, intrusion detection can be approached by machine learning …

A local search-based non-dominated sorting genetic algorithm for solving a multi-objective medical tourism trip design problem considering the attractiveness of trips

MH Kolaee, SMJM Al-e, A Jabbarzadeh - Engineering Applications of …, 2023 - Elsevier
Nowadays, the medical tourism industry encourages many healthcare practitioners to
provide high-quality and low-cost medical services for patients worldwide. The development …

An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique

S Shamshirband, NB Anuar, MLM Kiah… - Engineering Applications of …, 2013 - Elsevier
The deployment of wireless sensor networks and mobile ad-hoc networks in applications
such as emergency services, warfare and health monitoring poses the threat of various …

Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …

A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach

MY Su, GJ Yu, CY Lin - Computers & security, 2009 - Elsevier
None of the previously proposed Network Intrusion Detection Systems (NIDSs), which are
subject to fuzzy association rules, can meet real-time requirements because they all apply …