Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale
暂无分享,去创建一个
K. Rajiv | V. Jyothsna | K. Munivara Prasad | G. Ramesh Chandra | G. R. Chandra | K. M. Prasad | K. Rajiv | V. Jyothsna | K. Prasad
[1] Shahram Sarkani,et al. MARK-ELM: Application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection , 2015, Expert Syst. Appl..
[2] Gagandeep Kaur,et al. Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data , 2021, Cluster Computing.
[3] Deepak Kshirsagar,et al. An efficient feature reduction method for the detection of DoS attack , 2021, ICT Express.
[4] K. Venugopal Rao,et al. DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment , 2018, Cluster Computing.
[5] Rouhollah Rahmani,et al. An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments , 2020, Cluster Computing.
[6] Maurizio Aiello,et al. Taxonomy of Slow DoS Attacks to Web Applications , 2012, SNDS.
[7] K. Venugopal Rao,et al. Ensemble Classifiers with Drift Detection (ECDD) in Traffic Flow Streams to Detect DDOS Attacks , 2018, Wireless Personal Communications.
[8] S. Selvakumar,et al. A statistical class center based triangle area vector method for detection of denial of service attacks , 2020, Cluster Computing.
[9] Heejo Lee,et al. Flooding DDoS mitigation and traffic management with software defined networking , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).
[10] Ömer Kasim,et al. An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks , 2020, Comput. Networks.
[11] Shoushan Luo,et al. A two-level hybrid approach for intrusion detection , 2016, Neurocomputing.
[12] N. Umamaheswari,et al. TPF-IEHO: Tuning phantom features on traffic flow network behavioral conditions to detected DDos based on improved elephant herding optimization neural classification , 2021 .
[13] Tanja Zseby,et al. Analysis of network traffic features for anomaly detection , 2014, Machine Learning.
[14] Nazife Baykal,et al. Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm , 2020, J. Netw. Comput. Appl..
[15] Worachai Srimuang,et al. Classification model of network intrusion using Weighted Extreme Learning Machine , 2015, 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE).
[16] Mohd Juzaiddin Ab Aziz,et al. Anomalies Classification Approach for Network-based Intrusion Detection System , 2016, Int. J. Netw. Secur..
[17] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[18] K. Venugopal Rao,et al. BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection , 2017, Wirel. Pers. Commun..
[19] Iraj Mahdavi,et al. Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms , 2019, J. King Saud Univ. Comput. Inf. Sci..
[20] Jisa David,et al. Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic , 2019, Comput. Secur..
[21] Ghazi Al-Naymat,et al. Detecting Distributed Denial of Service Attacks Using Data Mining Techniques , 2016 .
[22] Noureddine Halla,et al. Ammodaucus leucotrichus and Citrullus colocynthis from algerian Sahara: Ethnopharmacological application, phytochemical screening, polyphenols content and antioxidant activity of hydromethanolic extracts , 2019, Journal of King Saud University - Science.
[23] Azzedine Boukerche,et al. TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things , 2020, Cluster Computing.
[24] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[25] Benoit Claise,et al. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , 2008, RFC.
[26] A. Ghasemi,et al. Normality Tests for Statistical Analysis: A Guide for Non-Statisticians , 2012, International journal of endocrinology and metabolism.