Search Results - (( data selection methods algorithm ) OR ( attack detection method algorithm ))
Search alternatives:
- selection methods »
- methods algorithm »
- method algorithm »
- data selection »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
2
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
3
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
Get full text
Get full text
Thesis -
4
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
6
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
8
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
9
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
11
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
12
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
13
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…However, these IDS methods only detect specific attack but fails when the attacks are combined. …”
Get full text
Get full text
Article -
14
Hybrid intelligent approach for network intrusion detection
Published 2015“…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. …”
Get full text
Get full text
Get full text
Thesis -
15
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
Get full text
Get full text
Conference or Workshop Item -
16
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
Published 2024“…However, the literature pays little attention to selection methods, which are crucial for developing effective machinelearning models.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
Get full text
Get full text
Get full text
Article -
18
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
19
Efficient feature selection analysis for accuracy malware classification
Published 2021“…Our framework used three major methods for effective feature representation on malware detection and used this method to classify malware and benign. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
