A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
暂无分享,去创建一个
[1] Ditipriya Sinha,et al. An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset , 2019, Cluster Computing.
[2] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[3] Santosh Kumar Sahu,et al. A detail analysis on intrusion detection datasets , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[4] Ron Kohavi,et al. Feature Selection for Knowledge Discovery and Data Mining , 1998 .
[5] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[6] Wenke Lee,et al. Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection : Results from the JAM Project ∗ , 2008 .
[7] Hiroshi Motoda,et al. Feature Selection for Knowledge Discovery and Data Mining , 1998, The Springer International Series in Engineering and Computer Science.
[8] A. Abraham,et al. Intrusion Detection Systems Using Decision Trees and Support Vector Machines , 2004 .
[9] Salvatore Ruggieri,et al. Efficient C4.5 , 2002, IEEE Trans. Knowl. Data Eng..
[10] Yuhui Shi,et al. Particle swarm optimization: developments, applications and resources , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[11] Robert K. Cunningham,et al. The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation , 1998 .
[12] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[13] Li Hongnan,et al. A new swarm intelligent optimization algorithm: Pigeon Colony Algorithm (PCA) , 2016 .
[14] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[15] A. Malathi,et al. A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .
[16] Haibin Duan,et al. Pigeon-inspired optimization: a new swarm intelligence optimizer for air robot path planning , 2014, Int. J. Intell. Comput. Cybern..
[17] A. K. Bhattacharjee,et al. IDS alerts classification using knowledge-based evaluation , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[18] Shailendra Singh,et al. An IWD-based feature selection method for intrusion detection system , 2017, Soft Computing.
[19] K. Muneeswaran,et al. Firefly algorithm based feature selection for network intrusion detection , 2019, Comput. Secur..
[20] Guang Cheng,et al. An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier , 2019, ArXiv.
[21] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[22] Manijeh Keshtgary,et al. Intrusion Detection based on a Novel Hybrid Learning Approach , 2018 .
[23] Xiangjian He,et al. A Novel Feature Selection Approach for Intrusion Detection Data Classification , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[24] Valentin Sgarciu,et al. Enhanced intrusion detection system based on bat algorithm-support vector machine , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[25] Amit Kumar Dewangan,et al. An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set , 2014 .
[26] Hadis Karimipour,et al. Cyber intrusion detection by combined feature selection algorithm , 2019, J. Inf. Secur. Appl..
[27] Vinita R. Shewale,et al. Performance Evaluation of Attack Detection Algorithms using Improved Hybrid IDS with Online Captured Data , 2016 .
[28] Yuan-Shun Dai,et al. Feature selection based on feature interactions with application to text categorization , 2019, Expert Syst. Appl..
[29] Adel Sabry Eesa,et al. A new feature selection model based on ID3 and bees algorithm for intrusion detection system , 2015 .
[30] Mohammad Javad Golkar,et al. A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.
[31] Aboul Ella Hassanien,et al. Binary grey wolf optimization approaches for feature selection , 2016, Neurocomputing.
[32] Fakhri Karray,et al. Features Selection for Intrusion Detection Systems Based on Support Vector Machines , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[33] Gulshan Kumar,et al. Evaluation Metrics for Intrusion Detection Systems - A Study , 2014 .
[34] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[35] Bayu Adhi Tama,et al. TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System , 2019, IEEE Access.
[36] H. Duan,et al. PID controller design based on Prey-Predator Pigeon-Inspired Optimization algorithm , 2014, 2014 IEEE International Conference on Mechatronics and Automation.
[37] Ke Chen,et al. Hybrid particle swarm optimization with spiral-shaped mechanism for feature selection , 2019, Expert Syst. Appl..
[38] Bo Zhang,et al. Three-Dimensional Path Planning for Uninhabited Combat Aerial Vehicle Based on Predator-Prey Pigeon-Inspired Optimization in Dynamic Environment , 2017, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[39] Jill Slay,et al. A hybrid feature selection for network intrusion detection systems: Central points , 2017, ArXiv.
[40] Valentin Sgarciu,et al. Anomaly Intrusions Detection Based on Support Vector Machines with an Improved Bat Algorithm , 2015, 2015 20th International Conference on Control Systems and Computer Science.
[41] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[42] Hossam Faris,et al. The Influence of Input Data Standardization Methods on the Prediction Accuracy of Genetic Programming Generated Classifiers , 2018, IJCCI.
[43] Hossam Faris,et al. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection , 2019, Journal of Ambient Intelligence and Humanized Computing.
[44] Arthur Zimek,et al. Redundancies in Data and their Effect on the Evaluation of Recommendation Systems: A Case Study on the Amazon Reviews Datasets , 2017, SDM.
[45] Noorhaniza Wahid,et al. A hybrid network intrusion detection system using simplified swarm optimization (SSO) , 2012, Appl. Soft Comput..
[46] Haibin Duan,et al. Control parameter design for automatic carrier landing system via pigeon-inspired optimization , 2016 .
[47] Mohamed Touahria,et al. Feature Selection Algorithms in Intrusion Detection System: A Survey , 2018, KSII Trans. Internet Inf. Syst..
[48] Selma Ayse Özel,et al. A hybrid approach of differential evolution and artificial bee colony for feature selection , 2016, Expert Syst. Appl..
[49] Abdul Rahim Abdullah,et al. Binary Competitive Swarm Optimizer Approaches for Feature Selection , 2019, Comput..