Search Results - (( using classification based algorithm ) OR ( attack detection utilizing algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol by Napiah, Mohamad Nazrin, Idris, Mohd Yamani Idna, Ramli, Roziana, Ahmedy, Ismail

    Published 2018
    “…These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. …”
    Get full text
    Get full text
    Article
  5. 5

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
    Get full text
    Get full text
    Article
  7. 7

    A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network by Adnan Shahid, Khan, ZEESHAN, AHMAD, JOHARI, ABDULLAH, FARHAN, AHMAD

    Published 2021
    “…Despite enormous efforts by researchers, NIDS still suffers from a high false alarm rate (FAR) in detecting novel attacks. In this paper, we propose a novel NIDS framework based on a deep convolution neural network that utilizes network spectrogram images generated using the short-time Fourier transform. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Ganoderma boninense classification based on near-infrared spectral data using machine learning techniques by Mas Ira Syafila, Mohd Hilmi Tan, Mohd Faizal, Jamlos, Ahmad Fairuz, Omar, Kamarulzaman, Kamarudin, Mohd Aminudin, Jamlos

    Published 2022
    “…There is yet a non-destructive and in-situ technique explored to detect ergosterol. Capability of NIR to detect few biomarkers such as mycotoxin and zearalenone (ZEN) has been proven to pave the way an effort to explore NIR’s sensitivity towards detecting ergosterol, as discussed in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…In this research, Two-Phase Authentication of Attack Detection (TPAAD) scheme is proposed and investigated for detection and mitigation of DoS attacks in SDN to increase the performance of the above-mentioned issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The ML-AP relay model addressed the cyber-attack and latency compromises in the earlier APS relay for the modern power system network. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Tole, Sutikno, Shahreen, Kasim, Rohayanti, Hassan, Zalmiyah, Zakaria, Mohd Saberi, Mohamad

    Published 2021
    “…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA) by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Ferda, Ernawan, Syifak, Izhar Hisham, Mohd Faizal, Ab Razak

    Published 2023
    “…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
    Get full text
    Get full text
    Get full text
    Article