Search Results - (( intrusion detection method algorithm ) OR ( based optimization swarm algorithm ))
Search alternatives:
- optimization swarm »
- method algorithm »
- swarm algorithm »
- intrusion »
-
1
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…In these experiments, it was demonstrated that the FLN optimization method achieved 0.9964 which is a higher accuracy than most of the existing paradigms for classifying network intrusion detection data.…”
Get full text
Get full text
Thesis -
2
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Thus, this study is looking for better, new dataset and more reliable optimized method for detecting the intrusion with highest accuracy. …”
Get full text
Get full text
Thesis -
3
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
4
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. …”
Get full text
Get full text
Thesis -
7
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…The objective of this paper is to study and make a comparison among the available intrusion detections algorithms and methods in the intrusion detections. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. …”
Get full text
Monograph -
10
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
11
Machine learning algorithms in context of intrusion detection
Published 2016“…Design of efficient, accurate, and low complexity intrusion detection system is a challenging task. Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
Get full text
Get full text
Conference or Workshop Item -
12
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…Anomaly based intrusion detection is a type of intrusion detection system that identifies anomalies. …”
Get full text
Get full text
Get full text
Article -
13
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…In this paper, an improved method for intrusion detection for binary classification was presented and discussed in detail. …”
Get full text
Get full text
Get full text
Article -
15
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
16
Multi-State Particle Swarm Optimization for Discrete Combinatorial Optimization Problem
Published 2014“…The binary-based algorithms including the binary particle swarm optimization (BPSO) algorithm are proposed to solve discrete optimization problems. …”
Get full text
Get full text
Get full text
Article -
17
Score Fusion Using Hybrid Bacterial Foraging Optimization And Particle Swarm Optimization (Bfo-Pso) For Hand-Based Multimodal Biometrics
Published 2020“…Therefore, this research is focused on the hand-based multimodal biometric score fusion which incorporates the scores of hand-based multimodalities and the optimal weights using Hybrid Bacterial Foraging - Particle Swarm Optimization (HBF-PSO) algorithm.…”
Get full text
Get full text
Thesis -
18
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
19
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
20
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. …”
Get full text
Get full text
Get full text
Article
