A deep learning approach with Bayesian optimization and ensemble classifiers for detecting denial of service attacks

[1]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[2]  Liang Hong,et al.  Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation , 2018 .

[3]  S. Cessie,et al.  Ridge Estimators in Logistic Regression , 1992 .

[4]  Gisung Kim,et al.  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..

[5]  Jerzy Stefanowski,et al.  Multi-class and feature selection extensions of Roughly Balanced Bagging for imbalanced data , 2018, Journal of Intelligent Information Systems.

[6]  David W. Aha,et al.  Instance-Based Learning Algorithms , 1991, Machine Learning.

[7]  Zafer Aydin,et al.  Intelligent Anomaly Detection Techniques for Denial of Service Attacks , 2018 .

[8]  Ali Sadr,et al.  Automatic microstructural characterization and classification using dual tree complex wavelet-based features and Bees Algorithm , 2016, Neural Computing and Applications.

[9]  Miad Faezipour,et al.  Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.

[10]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[11]  Devesh Kumar Srivastava,et al.  Network Intrusion Detection in Big Dataset Using Spark , 2018 .

[12]  Geert Deconinck,et al.  Tackling Application-layer DDoS Attacks , 2012, ANT/MobiWIS.

[13]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[14]  David H. Wolpert,et al.  Stacked generalization , 1992, Neural Networks.

[15]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[16]  Abdullah Al Nahid,et al.  Effective Intrusion Detection System Using XGBoost , 2018, Inf..

[17]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[18]  Siyang Zhang,et al.  A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..

[19]  Basit Qureshi,et al.  On Energy Efficiency and Performance Evaluation of Single Board Computer Based Clusters: A Hadoop Case Study , 2019, Electronics.

[20]  Zhenyu Liu,et al.  A method of SVM with Normalization in Intrusion Detection , 2011 .

[21]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[22]  Aiko Pras,et al.  An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.

[23]  Norrozila Sulaiman,et al.  A novel intrusion detection system by using intelligent data mining in weka environment , 2011, WCIT.

[24]  Jiankun Hu,et al.  Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..

[25]  José Paulo Leal,et al.  EmoSpell, a Morphological and Emotional Word Analyzer , 2018, Inf..