Adaptations of data mining methodologies: A systematic literature review

V Plotnikova, M Dumas, F Milani - PeerJ Computer Science, 2020 - peerj.com
The use of end-to-end data mining methodologies such as CRISP-DM, KDD process, and
SEMMA has grown substantially over the past decade. However, little is known as to how …

[HTML][HTML] A dual-tier adaptive one-class classification IDS for emerging cyberthreats

MA Uddin, S Aryal, MR Bouadjenek… - Computer …, 2025 - Elsevier
In today's digital age, our dependence on IoT (Internet of Things) and IIoT (Industrial IoT)
systems has grown immensely, which facilitates sensitive activities such as banking …

A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach

MY Su, GJ Yu, CY Lin - Computers & security, 2009 - Elsevier
None of the previously proposed Network Intrusion Detection Systems (NIDSs), which are
subject to fuzzy association rules, can meet real-time requirements because they all apply …

Real-time multi-agent system for an adaptive intrusion detection system

WL Al-Yaseen, ZA Othman, MZA Nazri - Pattern Recognition Letters, 2017 - Elsevier
An adaptive intrusion detection system that can detect unknown attacks in real-time network
traffic is a major concern. Conventional adaptive intrusion detection systems are …

Distributed intrusion detection system based on data fusion method

Y Wang, H Yang, X Wang… - Fifth World Congress on …, 2004 - ieeexplore.ieee.org
Intrusion detection system (IDS) plays a critical role in information security because it
provides the last line protection for those protected hosts or networks when intruders elude …

Characterizing network traffic by means of the NetMine framework

D Apiletti, E Baralis, T Cerquitelli, V D'Elia - Computer Networks, 2009 - Elsevier
The NetMine framework allows the characterization of traffic data by means of data mining
techniques. NetMine performs generalized association rule extraction to profile …

SeLINA: A self-learning insightful network analyzer

D Apiletti, E Baralis, T Cerquitelli… - … on Network and …, 2016 - ieeexplore.ieee.org
Understanding the behavior of a network from a large scale traffic dataset is a challenging
problem. Big data frameworks offer scalable algorithms to extract information from raw data …

[HTML][HTML] Improving intrusion detection model prediction by threshold adaptation

AM Al Tobi, I Duncan - Information, 2019 - mdpi.com
Network traffic exhibits a high level of variability over short periods of time. This variability
impacts negatively on the accuracy of anomaly-based network intrusion detection systems …

System, method, and computer program for detecting and measuring changes in network behavior of communication networks utilizing real-time clustering algorithms

PA Ferguson, RF Llopis, PJ Cogan - US Patent 9,729,571, 2017 - Google Patents
(57) ABSTRACT A system, method, and computer program product are provided for
detecting and measuring changes in network behavior of communication networks utilizing …

An adaptive intrusion detection and prevention (ID/IP) framework for web services

CG Yee, WH Shin, G Rao - 2007 International Conference on …, 2007 - ieeexplore.ieee.org
The advance in Web technology has lead to more and more applications being deployed
over the Web service (WS) platform. However, the inherent security weaknesses of the WS …