Search Results - (( intrusion detection system algorithm ) OR ( based optimization modified algorithm ))

Search alternatives:

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…It is hoped that the study can contribute to the improvement of system performance in terms of intrusion detection in computer networks.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems by Hnaif, Adnan Ahmad Abdelfattah

    Published 2010
    “…The increasing speed of today’s computer networks directly affects the performance of Network Intrusion Detection Systems (NIDS) in terms of speed of detection of threats. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The aim of the Intrusion Detection System (IDS) is to monitor the network system for any sort of attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. …”
    Get full text
    Monograph
  11. 11

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…The objective of this paper is to study and make a comparison among the available intrusion detections algorithms and methods in the intrusion detections. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
    Get full text
    Get full text
    Article
  14. 14

    Intrusion detection system for the internet of things based on blockchain and multi-agent systems by Liang, Chao, Shanmugam, Bharanidharan, Azam, Sami, Karim, Asif, Islam, Ashraful, Zamani, Mazdak, Kavianpour, Sanaz, Idris, Norbik Bashah

    Published 2020
    “…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), and support vector machine (SVM) have been used for IDS in the last decades. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Design of efficient, accurate, and low complexity intrusion detection system is a challenging task. Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin by Suhaimi, Hamizan, Suliman, Saiful Izwan, Musirin, Ismail

    Published 2021
    “…Even with existing security measures such as firewalls, Intrusion Detection System (IDS) and antivirus to protect the network, the network is still vulnerable and its resources can be compromised by third parties. …”
    Get full text
    Get full text
    Get full text
    Article