An Optimal Intrusion Detection System using GWO-CSA-DSAE Model

[1]  Khan Muhammad,et al.  Five-category classification of pathological brain images based on deep stacked sparse autoencoder , 2017, Multimedia Tools and Applications.

[2]  Nimmy Krishnan,et al.  Machine Learning Based Intrusion Detection for Virtualized Infrastructures , 2018, 2018 International CET Conference on Control, Communication, and Computing (IC4).

[3]  Chung-Horng Lung,et al.  Evaluation of machine learning techniques for network intrusion detection , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[4]  Mohamed Rida,et al.  A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection , 2018, Comput. Secur..

[5]  Miad Faezipour,et al.  Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.

[6]  Abdelouahid Derhab,et al.  Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..

[7]  Verónica Bolón-Canedo,et al.  An ensemble of filters and classifiers for microarray data classification , 2012, Pattern Recognit..

[8]  Mohamed Farouk,et al.  A framework for efficient network anomaly intrusion detection with features selection , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).

[9]  Hong Zhang,et al.  Facial expression recognition via learning deep sparse autoencoders , 2018, Neurocomputing.

[10]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[11]  Nima Jafari Navimipour,et al.  Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm , 2019, ICT Express.

[12]  Partha Ghosh,et al.  CS-PSO based Intrusion Detection System in Cloud Environment , 2018, Advances in Intelligent Systems and Computing.

[13]  Sohail Asghar,et al.  Vector Based Genetic Algorithm to optimize predictive analysis in network security , 2017, Applied Intelligence.

[14]  Ole-Christoffer Granmo,et al.  Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation , 2019, EURASIP Journal on Information Security.

[15]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[16]  Shahrzad Zargari,et al.  Feature selection in UNSW-NB15 and KDDCUP'99 datasets , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).

[17]  Farrukh Aslam Khan,et al.  TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection , 2019, IEEE Access.

[18]  Andrew Lewis,et al.  Grey Wolf Optimizer , 2014, Adv. Eng. Softw..

[19]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[20]  Alireza Askarzadeh,et al.  A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm , 2016 .

[21]  Sunil Kumar Khatri,et al.  Filter-based Attribute Selection Approach for Intrusion Detection using k-Means Clustering and Sequential Minimal Optimization Techniq , 2019, 2019 Amity International Conference on Artificial Intelligence (AICAI).

[22]  Chirag Modi,et al.  Designing an efficient security framework for detecting intrusions in virtual network of cloud computing , 2019, Comput. Secur..

[23]  Mohamed Touahria,et al.  Feature selection for intrusion detection using new multi-objective estimation of distribution algorithms , 2019, Applied Intelligence.

[24]  S. Sai Satyanarayana Reddy,et al.  Intrusion Detection in Wireless Network Using Fuzzy Logic Implemented with Genetic Algorithm , 2019 .

[25]  Rahul Johari,et al.  SOAiCE: Simulation of Attacks in Cloud Computing Environment , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[26]  Arafat Awajan,et al.  Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).

[27]  Jiadong Ren,et al.  A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection , 2019, IEEE Access.

[28]  Naveen K. Chilamkurti,et al.  Survey on SDN based network intrusion detection system using machine learning approaches , 2018, Peer-to-Peer Networking and Applications.

[29]  Deepak Sharma,et al.  HyINT: Signature-Anomaly Intrusion Detection System , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[30]  Gozde Karatas,et al.  Deep Learning in Intrusion Detection Systems , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).

[31]  Harpreet Singh,et al.  A New Hybrid Algorithm Based on Grey Wolf Optimization and Crow Search Algorithm for Unconstrained Function Optimization and Feature Selection , 2019, IEEE Access.

[32]  Amin Karami,et al.  An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities , 2018, Expert Syst. Appl..

[33]  Verónica Bolón-Canedo,et al.  Testing Different Ensemble Configurations for Feature Selection , 2017, Neural Processing Letters.

[34]  Jaime Lloret,et al.  Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.

[35]  Ashraf B. El-Sisi,et al.  Network Intrusion Detection System based PSO-SVM for Cloud Computing , 2019, International Journal of Computer Network and Information Security.

[36]  Mohammed Anbar,et al.  Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm , 2019, Journal of Ambient Intelligence and Humanized Computing.

[37]  Abdallah Ghourabi,et al.  A Hybrid Intrusion Detection System for Cloud Computing Environments , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).

[38]  Na Wang,et al.  Building a Cloud IDS Using an Efficient Feature Selection Method and SVM , 2019, IEEE Access.

[39]  Sateesh K. Peddoju,et al.  HIDS: A host based intrusion detection system for cloud computing environment , 2014, International Journal of System Assurance Engineering and Management.

[40]  Abdelmgeid A. Ali,et al.  Improving the Performance of the Snort Intrusion Detection Using Clonal Selection , 2019, 2019 International Conference on Innovative Trends in Computer Engineering (ITCE).

[41]  Chen Xu,et al.  Network Intrusion Detection System as a Service on OpenStack Cloud , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).

[42]  Farrukh Aslam Khan,et al.  A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection , 2018, Cluster Computing.

[43]  Shalini Batra,et al.  Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection , 2017, Comput. Electr. Eng..