Review on anomaly based network intrusion detection system
暂无分享,去创建一个
[1] Hesham Altwaijry,et al. Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..
[2] Dharmaraj R. Patil,et al. Implementation of network intrusion detection system using variant of decision tree algorithm , 2015, 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE).
[3] Sushanta Karmakar,et al. Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[4] Hussein A. Abbass,et al. Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection , 2011, Pattern Analysis and Applications.
[5] Konstantinos Demertzis,et al. A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification , 2013, e-Democracy.
[6] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[7] Thinagaran Perumal,et al. Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming , 2015, Neural Processing Letters.
[8] Neelam Sharma,et al. INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .
[9] Yoshihiro Oyama,et al. Anomaly-Based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.
[10] Noor Ahmed Biswas,et al. Artificial Neural Network based System for Intrusion Detection using Clustering on Different Feature Selection , 2015 .
[11] Hassan Asgharian,et al. A fast anomaly detection system using probabilistic artificial immune algorithm capable of learning new attacks , 2013, Evolutionary Intelligence.
[12] Elias Procópio Duarte,et al. System and Network Security: Anomaly Detection and Monitoring , 2016, J. Electr. Comput. Eng..
[13] G Kalyani,et al. Performance Assessment of Different Classification Techniques for Intrusion Detection , 2012 .
[14] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[15] Arputharaj Kannan,et al. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM , 2012, Comput. Intell. Neurosci..
[16] Bose Sundan,et al. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments , 2015, TheScientificWorldJournal.
[17] Saeed Sharifian,et al. Modified parallel random forest for intrusion detection systems , 2016, The Journal of Supercomputing.
[18] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[19] Shingo Mabu,et al. A random-forests-based classifier using class association rules and its application to an intrusion detection system , 2016, Artificial Life and Robotics.
[20] Cherukuri Aswani Kumar,et al. Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..
[21] Yue Wu,et al. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..
[22] Ganesh Kumar,et al. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.
[23] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.
[24] Cungen Cao,et al. An incremental decision tree algorithm based on rough sets and its application in intrusion detection , 2011, Artificial Intelligence Review.
[25] Chou-Yuan Lee,et al. An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection , 2012, Appl. Soft Comput..
[26] Tanya Garg,et al. Combinational feature selection approach for network intrusion detection system , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.
[27] Wathiq Laftah Al-Yaseen,et al. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems. , 2015 .
[28] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[29] Farah Jemili,et al. Intrusion detection based on genetic fuzzy classification system , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[30] M. A. Jabbar,et al. Intelligent network intrusion detection system using data mining techniques , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[31] Syed Ali Khayam,et al. Accuracy improving guidelines for network anomaly detection systems , 2011, Journal in Computer Virology.
[32] Amrit Pal Singh,et al. Analysis of Host-Based and Network-Based Intrusion Detection System , 2014 .
[33] Nasser Yazdani,et al. Mutual information-based feature selection for intrusion detection systems , 2011, J. Netw. Comput. Appl..
[34] Jaime Lloret,et al. Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[35] V. Vaidehi,et al. Efficient host based intrusion detection system using Partial Decision Tree and Correlation feature selection algorithm , 2014, 2014 International Conference on Recent Trends in Information Technology.
[36] P. Ganeshkumar,et al. Adaptive Neuro-Fuzzy-Based Anomaly Detection System in Cloud , 2016, Int. J. Fuzzy Syst..
[37] Arputharaj Kannan,et al. Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..
[38] Jasmin Kevric,et al. An effective combining classifier approach using tree algorithms for network intrusion detection , 2017, Neural Computing and Applications.
[39] Elsayed A. Sallam,et al. A hybrid network intrusion detection framework based on random forests and weighted k-means , 2013 .