Real-time anomaly detection using parallelized intrusion detection architecture for streaming data

[1]  Dong Seong Kim,et al.  Network-Based Intrusion Detection with Support Vector Machines , 2003, ICOIN.

[2]  Minxia Luo,et al.  Ensemble extreme learning machine and sparse representation classification , 2016, J. Frankl. Inst..

[3]  Yinhui Li,et al.  An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..

[4]  Atta Badii,et al.  Real-time feature selection technique with concept drift detection using adaptive micro-clusters for data stream mining , 2018, Knowl. Based Syst..

[5]  Neeraj Kumar,et al.  A feature reduced intrusion detection system using ANN classifier , 2017, Expert Syst. Appl..

[6]  Omar Y. Al-Jarrah,et al.  Semi-supervised multi-layered clustering model for intrusion detection , 2017, Digit. Commun. Networks.

[7]  Wee Keong Ng,et al.  Learning under concept drift with follow the regularized leader and adaptive decaying proximal , 2018, Expert Syst. Appl..

[8]  Bin Luo,et al.  A novel intrusion detection system based on feature generation with visualization strategy , 2014, Expert Syst. Appl..

[9]  Luiz Eduardo Soares de Oliveira,et al.  Toward a reliable anomaly-based intrusion detection in real-world environments , 2017, Comput. Networks.

[10]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[11]  Marley M. B. R. Vellasco,et al.  DetectA: abrupt concept drift detection in non-stationary environments , 2018, Appl. Soft Comput..

[12]  Di Guo,et al.  Extreme Kernel Sparse Learning for Tactile Object Recognition , 2017, IEEE Transactions on Cybernetics.

[13]  Kwangjo Kim,et al.  Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection , 2016, IEEE Transactions on Cybernetics.

[14]  U. Srinivasulu Reddy,et al.  Cost-sensitive Risk Induced Bayesian Inference Bagging (RIBIB) for credit card fraud detection , 2018, J. Comput. Sci..

[15]  Seyed Mojtaba Hosseini Bamakan,et al.  An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.

[16]  Stefan C. Kremer,et al.  Network intrusion detection system based on recursive feature addition and bigram technique , 2018, Comput. Secur..

[17]  Luiz Eduardo Soares de Oliveira,et al.  Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems , 2017, IEEE Transactions on Computers.

[18]  Qi Fang,et al.  A Semi-supervised Intrusion Detection Algorithm Based on Natural Neighbor , 2016, 2016 International Conference on Information System and Artificial Intelligence (ISAI).

[19]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[20]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[21]  Maria Papadaki,et al.  A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm , 2010, Comput. Secur..

[22]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[23]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[24]  Harish Kumar,et al.  An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..

[25]  Kwangjo Kim,et al.  Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[26]  David Zhang,et al.  Robust Visual Knowledge Transfer via Extreme Learning Machine-Based Domain Adaptation , 2016, IEEE Transactions on Image Processing.

[27]  Sameer Singh,et al.  Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..

[28]  Dong Hyun Jeong,et al.  A multi-level intrusion detection method for abnormal network behaviors , 2016, J. Netw. Comput. Appl..

[29]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[30]  Amaury Lendasse,et al.  Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines , 2017, J. Frankl. Inst..

[31]  Zahid Anwar,et al.  A fast and scalable technique for constructing multicast routing trees with optimized quality of service using a firefly based genetic algorithm , 2014, Multimedia Tools and Applications.

[32]  Jie Gu,et al.  An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..