PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW
暂无分享,去创建一个
[1] N. Z. Tarapore,et al. Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm , 2012 .
[2] Kotagiri Ramamohanarao,et al. Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.
[3] Henry Leung,et al. Network Intrusion Detection Using CFAR Abrupt-Change Detectors , 2008, IEEE Transactions on Instrumentation and Measurement.
[4] A. Anou,et al. RETRACTED: A Bayesian Networks in Intrusion Detection Systems , 2007 .
[5] Manas Ranjan Patra,et al. SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM , 2008 .
[6] S. T. Sarasamma,et al. Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[7] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[8] Thuzar Hlaing,et al. Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection , 2012 .
[9] Zurina Mohd Hanapi,et al. Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System , 2013, J. Comput. Sci..
[10] Muhammad Hussain,et al. Optimized intrusion detection mechanism using soft computing techniques , 2013, Telecommun. Syst..
[11] Taghi M. Khoshgoftaar,et al. Active learning with neural networks for intrusion detection , 2010, 2010 IEEE International Conference on Information Reuse & Integration.
[12] Mansour Sheikhan,et al. Fast Neural Intrusion Detection System Based on Hidden Weight Optimization Algorithm and Feature Selection , 2009 .
[13] Mansour Sheikhan,et al. Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.
[14] Neveen I. Ghali,et al. Feature Selection for Effective Anomaly-Based Intrusion Detection , 2009 .
[15] K Raghuveer,et al. Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set , 2012 .
[16] S. Selvan,et al. Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network , 2007 .
[17] Mostaque Md. Morshedur Hassan. Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic , 2013, ArXiv.
[18] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..
[19] Gregorio Martínez Pérez,et al. Intrusion detection using a linguistic hedged fuzzy-XCS classifier system , 2008, Soft Comput..
[20] Sherif M. Badr. Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS) , 2013 .
[21] V. Venkatachalam,et al. PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM CLASSIFIERS USING VARIOUS FEATURE REDUCTION TECHNIQUES , 2008 .
[22] Xinghuo Yu,et al. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection , 2009, IEEE Network.
[23] Dewan Md. Farid,et al. Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..
[24] R. Shanmugavadivu. NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC , 2011 .
[25] G. Smaragdakis,et al. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures , 2009, IEEE/ACM Transactions on Networking.
[26] Mohammad Saniee Abadeh,et al. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection , 2010, ISC Int. J. Inf. Secur..
[27] R. S. Rajesh,et al. A Genetic Algorithm Based elucidation for improving Intrusion Detection through condensed feature set by KDD 99 data set , 2011 .
[28] Ahmad Habibizad Navin,et al. A new system to evaluate GA-based clustering algorithms in Intrusion Detection alert management system , 2010, 2010 Second World Congress on Nature and Biologically Inspired Computing (NaBIC).
[29] Hua Jiang,et al. The Application of Genetic Neural Network in Network Intrusion Detection , 2009, J. Comput..
[30] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[31] Amin Einipour,et al. Intelligent Intrusion Detection in Computer Networks Using Fuzzy Systems , 2012 .
[32] Sung-Bae Cho,et al. Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Trans. Syst. Man Cybern. Part B.
[33] Shingo Mabu,et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[34] Wei Hu,et al. AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[35] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[36] Sherif M. Badr. Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS) , 2013 .
[37] S. Selvakani,et al. Feature Selection of Intrusion Detection Data using a Hybrid Genetic Algorithm/KNN Approach , 2003, HIS.
[38] M. Sakthivel,et al. A Refined Differential Evolution Algorithm Based Fuzzy Classifier for Intrusion Detection , 2011 .
[39] Manas Ranjan Patra,et al. Ensemble Voting System for Anomaly Based Network Intrusion Detection , 2009 .
[40] Malcolm I. Heywood,et al. Training genetic programming on half a million patterns: an example from anomaly detection , 2005, IEEE Transactions on Evolutionary Computation.
[41] S. K. Srivatsa,et al. Detecting and preventing attacks using network intrusion detection systems , 2008 .
[42] Hongjoong Kim,et al. A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods , 2006, IEEE Transactions on Signal Processing.
[43] Rung Ching Chen,et al. Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.
[44] Murad A. Rassam,et al. Artificial Immune Network Clustering approach for Anomaly Intrusion Detection , 2012 .
[45] Siti Mariyam Shamsuddin,et al. Ensemble classifiers for network intrusion detection system , 2009 .