An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons
暂无分享,去创建一个
Aman Jantan | Waheed Ali H. M. Ghanem | Abdullah B. Nasser | Sanaa Abduljabbar Ahmed Ghaleb | A. Jantan | W. Ghanem | S. A. A. Ghaleb | S. A. Ghaleb
[1] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[2] Georgios Kambourakis,et al. Dendron : Genetic trees driven rule induction for network intrusion detection systems , 2018, Future Gener. Comput. Syst..
[3] Ruzhi Xu,et al. Research intrusion detection based PSO-RBF classifier , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.
[4] Hongyu Yang,et al. Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network , 2019, IEEE Access.
[5] D.R. Hush,et al. Progress in supervised neural networks , 1993, IEEE Signal Processing Magazine.
[6] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[7] A. Jantan,et al. NEW APPROACH TO IMPROVE ANOMALY DETECTION USING A NEURAL NETWORK OPTIMIZED BY HYBRID ABC AND PSO ALGORITHMS , 2018 .
[8] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[9] Aman Jantan,et al. Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization , 2019, Neural Processing Letters.
[10] Hamid H. Jebur,et al. Identifying Generic Features of KDD Cup 1999 for Intrusion Detection , 2015 .
[11] Jasmin Kevric,et al. An effective combining classifier approach using tree algorithms for network intrusion detection , 2017, Neural Computing and Applications.
[12] Alyani Ismail,et al. A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.
[13] Shie-Jue Lee,et al. Network intrusion detection using equality constrained-optimization-based extreme learning machines , 2018, Knowl. Based Syst..
[14] Hongjun Lu,et al. Effective Data Mining Using Neural Networks , 1996, IEEE Trans. Knowl. Data Eng..
[15] Tian Wang,et al. Improved BP Neural Network for Intrusion Detection Based on AFSA , 2015 .
[16] Seref Sagiroglu,et al. Big data analytics for network anomaly detection from netflow data , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).
[17] Aman Jantan,et al. A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons , 2018, Cognitive Computation.
[18] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[19] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[20] Wooseong Kim,et al. 1D CNN based network intrusion detection with normalization on imbalanced data , 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[21] Seyedali Mirjalili,et al. Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems , 2015, Neural Computing and Applications.
[22] Bahari Belaton,et al. Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework , 2013, 2013 IEEE International Conference on Control System, Computing and Engineering.
[23] Rui Zhang,et al. Model of the intrusion detection system based on the integration of spatial-temporal features , 2020, Comput. Secur..
[24] Teresa Bernarda Ludermir,et al. Hybrid Training of Feed-Forward Neural Networks with Particle Swarm Optimization , 2006, ICONIP.
[25] Georgios Kambourakis,et al. Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..
[26] Xiangliang Zhang,et al. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..
[27] Haitao Li,et al. Research on prediction of traffic flow based on dynamic fuzzy neural networks , 2015, Neural Computing and Applications.
[28] Ahmad Sharieh,et al. A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer , 2020 .
[29] A. Jantan,et al. USING MODIFIED BAT ALGORITHM TO TRAIN NEURAL NETWORKS FOR SPAM DETECTION 1 , 2017 .
[30] Guifa Teng,et al. Unsupervised SVM Based on p-kernels for Anomaly Detection , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[31] Mansour Sheikhan,et al. Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network , 2012, Neural Computing and Applications.
[32] Dervis Karaboga,et al. Artificial Bee Colony (ABC) Optimization Algorithm for Training Feed-Forward Neural Networks , 2007, MDAI.
[33] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[34] Iraj Mahdavi,et al. Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms , 2019, J. King Saud Univ. Comput. Inf. Sci..
[35] Mehdi MORADI,et al. A Neural Network Based System for Intrusion Detection and Classification of Attacks , 2004 .
[36] Kun-Lin Tsai,et al. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques , 2017, IEEE Systems Journal.
[37] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[38] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[39] Mahmod S. Mahmod,et al. A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK , 2013 .
[40] Zhen Li,et al. TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[41] Carlos García Garino,et al. An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..
[42] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[43] Tomasz Imielinski,et al. Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..
[44] Li Zhang,et al. A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks , 2016, Neural Computing and Applications.
[45] A. Jantan,et al. USING HYBRID ARTIFICIAL BEE COLONY ALGORITHM AND PARTICLE SWARM OPTIMIZATION FOR TRAINING FEED-FORWARD NEURAL NETWORKS , 2014 .
[46] Hao Yu,et al. Distributed-neuron-network based machine learning on smart-gateway network towards real-time indoor data analytics , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[47] Arputharaj Kannan,et al. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.
[48] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[49] Chunlin Zhang,et al. Comparison of BPL and RBF Network in Intrusion Detection System , 2003, RSFDGrC.
[50] Aman Jantan,et al. A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm , 2019, Neural Computing and Applications.
[51] Bart Baesens,et al. Editorial survey: swarm intelligence for data mining , 2010, Machine Learning.
[52] Chunying Zhang,et al. Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network , 2019, IEEE Access.
[53] WenJie Tian,et al. Network intrusion detection analysis with neural network and particle swarm optimization algorithm , 2010, 2010 Chinese Control and Decision Conference.
[54] Mohamed S. Kamel,et al. RBF-based real-time hierarchical intrusion detection systems , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[55] R Vinayakumar,et al. Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network , 2019, Internet Technol. Lett..
[56] Yi Zeng,et al. $Deep-Full-Range$ : A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework , 2019, IEEE Access.
[57] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[58] Ge Yu,et al. Method of evolutionary neural network-based intrusion detection , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).
[59] Kishan G. Mehrotra,et al. Elements of artificial neural networks , 1996 .
[60] Christian Blum,et al. An ant colony optimization algorithm for continuous optimization: application to feed-forward neural network training , 2007, Neural Computing and Applications.
[61] Hong Shen,et al. Online training of SVMs for real-time intrusion detection , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[62] Aman Jantan,et al. Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition , 2019, IEEE Access.
[63] Dedy Dwi Prastyo,et al. Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system , 2020, Expert Syst. Appl..
[64] Baha Rababah,et al. Hybrid Model For Intrusion Detection Systems , 2020, ArXiv.
[65] Lan Shi,et al. PCA-PSO-BP Neural Network Application in IDS , 2015 .
[66] Mohammad Javad Golkar,et al. A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.
[67] Lu Lv,et al. A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine , 2020, Knowl. Based Syst..
[68] Gulshan Kumar,et al. A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks , 2015, Intelligent Methods for Cyber Warfare.
[69] Dervis Karaboga,et al. Hybrid Artificial Bee Colony algorithm for neural network training , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).
[70] Anazida Zainal,et al. Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection , 2007, ICCSA.
[71] X. Yao. Evolving Artificial Neural Networks , 1999 .
[72] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[73] Václav Snásel,et al. Metaheuristic design of feedforward neural networks: A review of two decades of research , 2017, Eng. Appl. Artif. Intell..
[74] Jill Slay,et al. The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[75] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[76] Raimo Kantola,et al. Performance Evaluation of a Combined Anomaly Detection Platform , 2019, IEEE Access.