A hybrid method consisting of GA and SVM for intrusion detection system
In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is
proposed and its implementation in intrusion detection problem is explained. The proposed …
proposed and its implementation in intrusion detection problem is explained. The proposed …
New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN
S Hosseini, BMH Zade - Computer Networks, 2020 - Elsevier
Intrusion detection systems (IDS) have been playing an important role for providing security
of computer networks. They detect different types of attacks and malicious software usage …
of computer networks. They detect different types of attacks and malicious software usage …
Role of swarm and evolutionary algorithms for intrusion detection system: A survey
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
A new machine learning method consisting of GA-LR and ANN for attack detection
S Hosseini - Wireless Networks, 2020 - Springer
Advances in computer networks led to the generation of much data that computer networks
must be capable of transmitting. The security of this volume of data is a major challenge for …
must be capable of transmitting. The security of this volume of data is a major challenge for …
Bio-inspired hybrid feature selection model for intrusion detection
Intrusion detection is a serious and complex problem. Undoubtedly due to a large number of
attacks around the world, the concept of intrusion detection has become very important. This …
attacks around the world, the concept of intrusion detection has become very important. This …
Intrusion detection system based on genetic algorithm for detection of distribution denial of service attacks in MANETs
Mobile ad hoc networks (MANETs) are more susceptible towards security attacks because of
its complicated characteristics ie lack of clear boundary of defense, no centralized points …
its complicated characteristics ie lack of clear boundary of defense, no centralized points …
[PDF][PDF] Data pre-processing and classification for traffic anomaly intrusion detection using NSLKDD dataset
L Gnanaprasanambikai, N Munusamy - Cybernetics and Information …, 2018 - sciendo.com
Network security is essential in the Internet world. Intrusion Detection is one of the network
security components. Anomaly Intrusion Detection is a type of intrusion detection that …
security components. Anomaly Intrusion Detection is a type of intrusion detection that …
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
As the influence of Internet and networking technologies as communication medium
advance and expand across the globe, cyber attacks also grow accordingly. Anomaly …
advance and expand across the globe, cyber attacks also grow accordingly. Anomaly …
Intrusion detection system using genetic algorithm and K-NN algorithm on DoS attack
MA Fauzi, AT Hanuranto… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
Intrusion Detection is the process of monitoring and identifying activity on a host or network
to prove whether the host or network has been successfully attacked or is still an attempt at …
to prove whether the host or network has been successfully attacked or is still an attempt at …
[HTML][HTML] Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
The number of users of the Internet has been continuously rising, with an estimated 5.1
billion users in 2023, which comprises around 64.7% of the total world population. This …
billion users in 2023, which comprises around 64.7% of the total world population. This …