RFA Reinforced Firefly Algorithm to Identify Optimal Feature Subsets for Network IDS

[1]  Kuinam J. Kim,et al.  A feature selection approach to find optimal feature subsets for the network intrusion detection system , 2015, Cluster Computing.

[2]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[3]  Glenn Fung,et al.  A Feature Selection Newton Method for Support Vector Machine Classification , 2004, Comput. Optim. Appl..

[4]  Xin-She Yang,et al.  Firefly algorithm, stochastic test functions and design optimisation , 2010, Int. J. Bio Inspired Comput..

[5]  S. V. Raghavan,et al.  Intrusion detection through learning behavior model , 2001, Comput. Commun..

[6]  Zhixin Sun,et al.  An Improved Intrusion Detection Algorithm Based on GA and SVM , 2018, IEEE Access.

[7]  Nasser Yazdani,et al.  Mutual information-based feature selection for intrusion detection systems , 2011, J. Netw. Comput. Appl..

[8]  Youwei Wang,et al.  Novel artificial bee colony based feature selection method for filtering redundant information , 2018, Applied Intelligence.

[9]  Andrew H. Sung,et al.  Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection , 2005 .

[10]  T. P. Latchoumi,et al.  Particle Swarm Optimization approach for waterjet cavitation peening , 2019, Measurement.

[11]  Ünal Çavusoglu,et al.  A new hybrid approach for intrusion detection using machine learning methods , 2019, Applied Intelligence.

[12]  Yuh-Jye Lee,et al.  SSVM: A Smooth Support Vector Machine for Classification , 2001, Comput. Optim. Appl..

[13]  Dewan Md Farid,et al.  Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs , 2014, The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014).

[14]  Peyman Kabiri,et al.  Feature Selection for Intrusion Detection System Using Ant Colony Optimization , 2016, Int. J. Netw. Secur..

[15]  Iftikhar Ahmad,et al.  Feature Selection Using Particle Swarm Optimization in Intrusion Detection , 2015, Int. J. Distributed Sens. Networks.

[16]  Hadis Karimipour,et al.  Robust Massively Parallel Dynamic State Estimation of Power Systems Against Cyber-Attack , 2018, IEEE Access.

[17]  Hossein Gharaee,et al.  A new feature selection IDS based on genetic algorithm and SVM , 2016, 2016 8th International Symposium on Telecommunications (IST).

[18]  Alyani Ismail,et al.  A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.

[19]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[20]  K. Muneeswaran,et al.  Firefly algorithm based feature selection for network intrusion detection , 2019, Comput. Secur..

[21]  Khalil El-Khatib,et al.  Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.

[22]  Swati Paliwal,et al.  Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .

[23]  Fuhui Long,et al.  Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[24]  Nie Min,et al.  Anomaly intrusion detection based on wavelet kernel LS-SVM , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.

[25]  Gürsel Serpen,et al.  Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.

[26]  Vijay Kumar Jha,et al.  Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets , 2013 .

[27]  Xin-She Yang 17. Firefly Algorithm , 2010 .

[28]  Ferat Sahin,et al.  A survey on feature selection methods , 2014, Comput. Electr. Eng..

[29]  Zhong Ming,et al.  An improved NSGA-III algorithm for feature selection used in intrusion detection , 2017, Knowl. Based Syst..