Improving the Anomaly Detection by Combining PSO Search Methods and J48 Algorithm
暂无分享,去创建一个
Deris Stiawan | Rahmat Budiarto | Kurniabudi | Darmawijoyo | Mohd Yazid Bin Idris | Mohd Yazid bin Idris | Abdul Harris | Albertus Edward Mintaria | R. Budiarto | D. Stiawan | A. Harris | Darmawijoyo
[1] Shadi Aljawarneh,et al. An enhanced J48 classification algorithm for the anomaly intrusion detection systems , 2017, Cluster Computing.
[2] Naimah Yaakob,et al. Effective and efficient network anomaly detection system using machine learning algorithm , 2019, Bulletin of Electrical Engineering and Informatics.
[3] Reazul Kabir,et al. A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach , 2017 .
[4] J. Albert Mayan,et al. Anomaly Detection by Using CFS Subset and Neural Network with WEKA Tools , 2019 .
[5] Hossein Gharaee,et al. A new feature selection IDS based on genetic algorithm and SVM , 2016, 2016 8th International Symposium on Telecommunications (IST).
[6] Ahmed Ahmim,et al. A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models , 2018, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[7] Miad Faezipour,et al. Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.
[8] Deepak Dahiya,et al. Enhanced Intrusion Detection System for Detecting Rare Class Attacks using Correlation based Dimensionality Reduction Technique , 2016 .
[9] A Niranjan,et al. ERCR TV: Ensemble of Random Committee and Random Tree for Efficient Anomaly Classification Using Voting , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).
[10] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[11] K. A. Taher,et al. Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).
[12] Shikha Agrawal,et al. A Survey on Feature Selection Techniques for Internet Traffic Classification , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).
[13] Kajal Rai,et al. Decision Tree Based Algorithm for Intrusion Detection , 2016 .
[14] Bu Sung Lee Francis,et al. Combining MIC feature selection and feature-based MSPCA for network traffic anomaly detection , 2016, 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC).
[15] Qing Chang,et al. Feature selection methods for big data bioinformatics: A survey from the search perspective. , 2016, Methods.
[16] Cherukuri Aswani Kumar,et al. Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..
[17] Sudarson Jena,et al. Efficient Feature Subset Selection Algorithm for High Dimensional Data , 2016 .
[18] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[19] Aderemi Oluyinka Adewumi,et al. Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision , 2017, Int. J. Netw. Secur..
[20] Deepak Dahiya,et al. Features Contribution for Detecting Attacks of an Intrusion Detection System , 2017 .
[21] Abderrahmane Hajraoui,et al. A Survey of Malware Detection Techniques based on Machine Learning , 2019, International Journal of Advanced Computer Science and Applications.
[22] Gulshan Kumar,et al. Analysis of Feature Selection Techniques: A Data Mining Approach , 2016 .
[23] Adel Binbusayyis,et al. Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach , 2019, IEEE Access.
[24] Sudhir Kumar Sharma,et al. Performance Analysis of User to Root Attack Class Using Correlation Based Feature Selection Model , 2015, CISIS-ICEUTE.
[25] Ali A. Ghorbani,et al. Towards a Reliable Intrusion Detection Benchmark Dataset , 2017 .
[26] Sevcan Yilmaz Gündüz,et al. Feature Selection and Comparison of Classification Algorithms for Intrusion Detection , 2018 .
[27] Sushant Kumar Pandey. Design and performance analysis of various feature selection methods for anomaly‐based techniques in intrusion detection system , 2019, Secur. Priv..
[28] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[29] Peyman Kabiri,et al. Feature Selection for Intrusion Detection System Using Ant Colony Optimization , 2016, Int. J. Netw. Secur..
[30] Zeynep Turgut,et al. Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).
[31] Shulin Wang,et al. Feature selection in machine learning: A new perspective , 2018, Neurocomputing.
[32] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.