A survey on data-driven network intrusion detection
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …
classes compared to normal traffic. Many datasets are collected in simulated environments …
Data mining techniques in intrusion detection systems: A systematic literature review
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …
scalability, in which data mining techniques are playing an increasingly important role. We …
An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine
Realization of the importance for advanced tool and techniques to secure the network
infrastructure from the security risks has led to the development of many machine learning …
infrastructure from the security risks has led to the development of many machine learning …
An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm
Abstract 'Curse of Dimensionality'and the trade-off between high detection rate and less
false alarm rate make the design of an efficient and robust Intrusion Detection System, an …
false alarm rate make the design of an efficient and robust Intrusion Detection System, an …
A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems
Over the past few decades, the design of an intelligent Intrusion Detection System (IDS)
remains an open challenge to the research community. Continuous efforts by the …
remains an open challenge to the research community. Continuous efforts by the …
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection …
D Aksu, MA Aydin - Computers & Security, 2022 - Elsevier
Controller area network (CAN) bus which provides efficient, reliable and robust
communication between electronic control units (ECUs) is the most frequently used protocol …
communication between electronic control units (ECUs) is the most frequently used protocol …
Feature selection algorithms in intrusion detection system: A survey
S Maza, M Touahria - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
Regarding to the huge number of connections and the large flow of data on the Internet,
Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and …
Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and …
Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection
In this paper, an adaptive network intrusion detection method using fuzzy rough set-based
feature selection and GA-GOGMM-based pattern learning is presented. Based on the fuzzy …
feature selection and GA-GOGMM-based pattern learning is presented. Based on the fuzzy …
A trust centric optimal service ranking approach for cloud service selection
Cloud service selection, a promising research directive provides an intelligent solution via.
service ranking based on the Quality of Service (QoS) attributes for the identification of …
service ranking based on the Quality of Service (QoS) attributes for the identification of …
An improved robust heteroscedastic probabilistic neural network based trust prediction approach for cloud service selection
Trustworthiness is a comprehensive quality metric which is used to assess the quality of the
services in service-oriented environments. However, trust prediction of cloud services based …
services in service-oriented environments. However, trust prediction of cloud services based …