Combining naive bayes and decision tree for adaptive intrusion detection
In this paper, a new learning algorithm for adaptive network intrusion detection using naive
Bayesian classifier and decision tree is presented, which performs balance detections and …
Bayesian classifier and decision tree is presented, which performs balance detections and …
[KSIĄŻKA][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
[PDF][PDF] Network intrusion detection system using fuzzy logic
ABSTRACT IDS which are increasingly a key part of system defense are used to identify
abnormal activities in a computer system. In general, the traditional intrusion detection relies …
abnormal activities in a computer system. In general, the traditional intrusion detection relies …
Attacks classification in adaptive intrusion detection using decision tree
Recently, information security has become a key issue in information technology as the
number of computer security breaches are exposed to an increasing number of security …
number of computer security breaches are exposed to an increasing number of security …
[PDF][PDF] A literature survey and comprehensive study of intrusion detection
SK Jonnalagadda, RP Reddy - International Journal of Computer …, 2013 - academia.edu
With the rapid expansion of computer usage and computer network the security of the
computer system has became very important. Every day new kind of attacks are being faced …
computer system has became very important. Every day new kind of attacks are being faced …
Hybrid intelligent systems for detecting network intrusions
This paper intends to develop some novel hybrid intelligent systems by combining naïve
Bayes with decision trees (NBDT) and by combining non‐nested generalized exemplar …
Bayes with decision trees (NBDT) and by combining non‐nested generalized exemplar …
[PDF][PDF] Two-phase malicious web page detection scheme using misuse and anomaly detection
Misuse detection method and anomaly detection method are widely used for the detection of
malicious web pages. Both are based on machine learning. Misuse detection can detect …
malicious web pages. Both are based on machine learning. Misuse detection can detect …
Comparison of genetic algorithm optimization on artificial neural network and support vector machine in intrusion detection system
A Dastanpour, S Ibrahim, R Mashinchi… - … IEEE Conference on …, 2014 - ieeexplore.ieee.org
As the technology trend in the recent years uses the systems with network bases, it is crucial
to detect them from threats. In this study, the following methods are applied for detecting the …
to detect them from threats. In this study, the following methods are applied for detecting the …
Statistical analysis of different artificial intelligent techniques applied to Intrusion Detection System
Intrusion Detection System (IDS) which are increasingly a key part of system defense are
used to identify abnormal activities in a computer system. In general, the traditional IDS …
used to identify abnormal activities in a computer system. In general, the traditional IDS …
IoT-KEEPER: Securing IoT communications in edge networks
The increased popularity of IoT devices have made them lucrative targets for attackers. Due
to insecure product development practices, these devices are often vulnerable even to very …
to insecure product development practices, these devices are often vulnerable even to very …