Search Results - (( intrusion detection system algorithm ) OR ( based optimization modified algorithm ))
Search alternatives:
- optimization modified »
- system algorithm »
- intrusion »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
2
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. …”
Get full text
Get full text
Thesis -
3
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…It is hoped that the study can contribute to the improvement of system performance in terms of intrusion detection in computer networks.…”
Get full text
Get full text
Thesis -
4
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…The increasing speed of today’s computer networks directly affects the performance of Network Intrusion Detection Systems (NIDS) in terms of speed of detection of threats. …”
Get full text
Get full text
Thesis -
5
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The aim of the Intrusion Detection System (IDS) is to monitor the network system for any sort of attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…Additionally, the intrusion detection system (IDS) must be precise and quick to analyze real-time traffic data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
9
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
10
A study on advanced statistical analysis for network anomaly detection
Published 2005“…This approach is a lightweight intrusion detection method, given that requires only nine system calls that are strongly correlated to intrusions for analysis. …”
Get full text
Monograph -
11
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
12
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…The objective of this paper is to study and make a comparison among the available intrusion detections algorithms and methods in the intrusion detections. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
14
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
16
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
17
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), and support vector machine (SVM) have been used for IDS in the last decades. …”
Get full text
Get full text
Get full text
Article -
18
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Machine learning algorithms in context of intrusion detection
Published 2016“…Design of efficient, accurate, and low complexity intrusion detection system is a challenging task. Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
Get full text
Get full text
Conference or Workshop Item -
20
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…Even with existing security measures such as firewalls, Intrusion Detection System (IDS) and antivirus to protect the network, the network is still vulnerable and its resources can be compromised by third parties. …”
Get full text
Get full text
Get full text
Article
