Combining naive bayes and decision tree for adaptive intrusion detection

DM Farid, N Harbi, MZ Rahman - arxiv preprint arxiv:1005.4496, 2010 - arxiv.org
In this paper, a new learning algorithm for adaptive network intrusion detection using naive
Bayesian classifier and decision tree is presented, which performs balance detections and …

[KSIĄŻKA][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

[PDF][PDF] Network intrusion detection system using fuzzy logic

R Shanmugavadivu, N Nagarajan - Indian Journal of Computer Science …, 2011 - Citeseer
ABSTRACT IDS which are increasingly a key part of system defense are used to identify
abnormal activities in a computer system. In general, the traditional intrusion detection relies …

Attacks classification in adaptive intrusion detection using decision tree

CM Rahman, DM Farid, N Harbi, E Bahri, MZ Rahman - 2010 - dspace.uiu.ac.bd
Recently, information security has become a key issue in information technology as the
number of computer security breaches are exposed to an increasing number of security …

[PDF][PDF] A literature survey and comprehensive study of intrusion detection

SK Jonnalagadda, RP Reddy - International Journal of Computer …, 2013 - academia.edu
With the rapid expansion of computer usage and computer network the security of the
computer system has became very important. Every day new kind of attacks are being faced …

Hybrid intelligent systems for detecting network intrusions

M Panda, A Abraham, MR Patra - Security and Communication …, 2015 - Wiley Online Library
This paper intends to develop some novel hybrid intelligent systems by combining naïve
Bayes with decision trees (NBDT) and by combining non‐nested generalized exemplar …

[PDF][PDF] Two-phase malicious web page detection scheme using misuse and anomaly detection

S Yoo, S Kim, A Choudhary, OP Roy… - International Journal of …, 2014 - scholar.archive.org
Misuse detection method and anomaly detection method are widely used for the detection of
malicious web pages. Both are based on machine learning. Misuse detection can detect …

Comparison of genetic algorithm optimization on artificial neural network and support vector machine in intrusion detection system

A Dastanpour, S Ibrahim, R Mashinchi… - … IEEE Conference on …, 2014 - ieeexplore.ieee.org
As the technology trend in the recent years uses the systems with network bases, it is crucial
to detect them from threats. In this study, the following methods are applied for detecting the …

Statistical analysis of different artificial intelligent techniques applied to Intrusion Detection System

H Tribak, BL Delgado-Marquez, P Rojas… - 2012 International …, 2012 - ieeexplore.ieee.org
Intrusion Detection System (IDS) which are increasingly a key part of system defense are
used to identify abnormal activities in a computer system. In general, the traditional IDS …

IoT-KEEPER: Securing IoT communications in edge networks

I Hafeez, M Antikainen, AY Ding, S Tarkoma - arxiv preprint arxiv …, 2018 - arxiv.org
The increased popularity of IoT devices have made them lucrative targets for attackers. Due
to insecure product development practices, these devices are often vulnerable even to very …