Intrusion Detection System Using Support Vector Machine

EBSCOhost serves thousands of libraries with premium essays, articles and other content including Intrusion Detection System using Support Vector Machine. Novel intrusion detection system integrating layered framework with neural network. In 3rd IEEE Network intrusion detection using support vector machines. Intrusion Detection System Based on Genetic-SVM for DoS Attacks SVMclassifiers after extracting features from PMU 2014 datasets using geneticalgorithm.

[1]  D.S. Bauer,et al.  NIDX-an expert system for real-time network intrusion detection , 1988, [1988] Proceedings. Computer Networking Symposium.

[2]  Bu-Sung Lee,et al.  Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.

[3]  Zied Elouedi,et al.  Naive Bayes vs decision trees in intrusion detection systems , 2004, SAC '04.

[4]  Yongdae Kim,et al.  A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[5]  T. Ambwani,et al.  Multi class support vector machine implementation to intrusion detection , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[6]  AbrahamAjith,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007 .

[7]  Andrew H. Sung,et al.  Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[8]  Hai Sheng Li An Intrusion Detection Based on Markov Model , 2011 .

[9]  Ashraf Darwish,et al.  Principle components analysis and Support Vector Machine based Intrusion Detection System , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.

[10]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[11]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[12]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[13]  Anupam Joshi,et al.  Fuzzy clustering for intrusion detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[14]  Ron Kohavi,et al.  Feature Selection for Knowledge Discovery and Data Mining , 1998 .

[15]  J.B. Grizzard,et al.  An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..