Filters








2,379 Hits in 3.7 sec

Analysis of Machine Learning Techniques for Intrusion Detection System: A Review

Asghar AliShah, Malik Sikander Hayat Khiyal, Muhammad Daud Awan
2015 International Journal of Computer Applications  
Security is a key issue to both computer and computer networks. Intrusion detection System (IDS) is one of the major research problems in network security.  ...  Related studies include single, hybrid, ensemble classifiers, baseline and datasets used.  ...  Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks," Expert Systems with Applications, 29, 713-722. 2005. [31] E. Eskin, A. Arnold, M.  ... 
doi:10.5120/21047-3678 fatcat:pljhydysizblhkmufyers3ic2a

A Hybrid Intelligent Approach for Network Intrusion Detection

Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra
2012 Procedia Engineering  
Most intrusion detection systems (IDSs) mostly use a single classifier algorithm to classify the network traffic data as normal behaviour or anomalous.  ...  Intrusion detection is an emerging area of research in the computer security and networks with the growing usage of internet in everyday life.  ...  for testing is used for building an efficient Network intrusion detection system.  ... 
doi:10.1016/j.proeng.2012.01.827 fatcat:ttfziakfijgstkgneimp23lm6e

Application of Machine Learning Approaches in Intrusion Detection System: A Survey

Nutan Farah, Md. Avishek, Faisal Muhammad, Abdur Rahman, Musharrat Rafni, Dewan Md.
2015 International Journal of Advanced Research in Artificial Intelligence (IJARAI)  
Intrusion detection system is used to identify unauthorized access and unusual attacks over the secured networks.  ...  Over the past years, many studies have been conducted on the intrusion detection system.  ...  Artificial Neural NetworkDetection of accuracy for intrusion detection system using neural network classifier.  Neural networks-based detection of stepping-stone intrusion. (S.  ... 
doi:10.14569/ijarai.2015.040302 fatcat:v7a66oibcrhczn47azmlnl4q3q

HEAL: Heterogeneous Ensemble and Active Learning Framework

Anubhav Chhabra, Tirumala Sree Akhil Nandyala, Paula Branco
2021 Proceedings of the Canadian Conference on Artificial Intelligence  
Network Intrusion Detection is a well-known, relevant problem that has gained even more interest due to the exponential growth of technologies, systems and volume of data.  ...  In this paper we propose a Heterogeneous Ensemble and Active Learning (HEAL) system, a novel tool that incorporates the implementation of a dynamic heterogeneous ensemble model with active learning capabilities  ...  In [3] several ensemble classifiers for supervised anomaly-based network intrusion detection were also evaluated.  ... 
doi:10.21428/594757db.31ebdee8 fatcat:lb5cznd565eith3fy5vdvh6zpu

Intrusion detection using error correcting output code based ensemble

Shaza Merghani AbdElrahman, Ajith Abraham
2014 2014 14th International Conference on Hybrid Intelligent Systems  
We proposed a new hybrid ensemble for intrusion detection based on Error Correcting Output Code (ECOC) approach.  ...  In this paper, we try to tackle the class imbalance problem, increase detection rates for each class and minimize false alarms in intrusion detection system.  ...  RELATED WORKS Several approaches and many data mining techniques have been investigated for design an ensemble for Intrusion detection system such as Neural Network (NN), Support Vector Machines (SVM),  ... 
doi:10.1109/his.2014.7086194 dblp:conf/his/AbdElrahmanA14 fatcat:eqkxek5qengxtabnenjtrzabwa

MAIDEn: A Machine Learning Approach for Intrusion Detection using Ensemble Technique

Habil Damania, Aditya Jagtap, Abhishek Jain, Chaitanya Chavan, Shraddha Khonde
2018 International Journal of Computer Applications  
The proposed system of Intrusion Detection, classifies data with three different classifiers and an Ensemble technique which selects the majority of the three classifiers to assign the packet in the network  ...  An Intrusion detection system is a machine or software that monitors the traffic in a network and on detection of a malicious packet, informs the user or a specific acting unit which can take further action  ...  Various Intrusion Detection Systems (IDS) exist which help identify threats in the system but only an intelligent system will correctly yield them with maximum accuracy.  ... 
doi:10.5120/ijca2018916186 fatcat:qnikmqjdfrevhdv2d4apa6umk4

A Machine Learning Based Intrusion Detection System for Software Defined 5G Network [article]

Jiaqi Li, Zhifeng Zhao, Rongpeng Li
2017 arXiv   pre-print
It can also deal with unknown intrusions by using machine learning algorithms. Evaluation results prove that the intelligent intrusion detection system achieves a better performance.  ...  As the focus of network security, Intrusion Detection Systems (IDS) are usually deployed separately without collaboration.  ...  In this paper, we propose an intelligent intrusion detection system for Software Defined 5G networks.  ... 
arXiv:1708.04571v1 fatcat:duw3xkod3rewteyh54nkutpe54

Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation

Bayu Adhi Tama, Sunghoon Lim
2021 Computer Science Review  
Intrusion detection systems (IDSs) are intrinsically linked to a comprehensive solution of cyberattacks prevention instruments.  ...  Furthermore, this study reports and analyzes an empirical investigation of a new classifier ensemble approach, called stack of ensemble (SoE) for anomaly-based IDS.  ...  (intrusion detection systems OR anomaly detection OR misuse detection OR signature detection) AND (classifier ensemble OR ensemble learning OR multiple classifier systems OR voting OR boosting OR bagging  ... 
doi:10.1016/j.cosrev.2020.100357 fatcat:6vojyshrd5aencao6hfgcpd2mm

2019 IEEE Ninth International Conference on Intelligent Computing and Information System (ICICIS 2019)

2019 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)  
Sakr Filter Versus Wrapper Feature Selection for Network Intrusion Detection System 209 Mahmoud Marie UCM-AODV: Utility-based Cache Management for AODV Vehicular Ad Hoc Networks 293 Mahmoud Mohamed  ...  Iris Liveness Detection Techniques 48 Mohamed Roushdy Hybrid Method for Modeling User Interests based on Social Network Ahmed Kfafy A Novel Approach for Multi-Resource Planning in Construction Engineering  ... 
doi:10.1109/icicis46948.2019.9014855 fatcat:5pvzp55n7rhyrkszra52ybkwy4

Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting [article]

Tich Phuoc Tran, Longbing Cao, Dat Tran, Cuong Duc Nguyen
2009 arXiv   pre-print
Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems  ...  This article applies Machine Learning techniques to solve Intrusion Detection problems within computer networks.  ...  An Intrusion Detection System (IDS) is defined as a protection system that monitors computers or networks for unauthorized activities based on network traffic or system usage behaviors, thereby detecting  ... 
arXiv:0911.0485v1 fatcat:hd5vh4stajc33hiwa4arnmjdfe

A Literature Survey on the Importance of Intrusion Detection System for Wireless Networks

D. Selvamani, V. Selvi
2018 Asian Journal of Computer Science and Technology  
The range of study encompasses a brief history dating back to internet's beginnings and the current development in network security.  ...  With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology.  ...  novel ensemble construction method that uses PSO generated weights to create ensemble of classifiers with better accuracy for intrusion detection.  ... 
doi:10.51983/ajcst-2018.7.3.1905 fatcat:v63hfbqvybbaxj2nvnuybcgaza

Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors

D P Gaikwad, AISSMS College of Engineering, Pune, Maharashtra, India
2021 International Journal of Computer Network and Information Security  
In this paper, a novel ensemble classifier using rule combination method has proposed for intrusion detection system. Ensemble classifier is designed using three rule learners as base classifiers.  ...  Intrusion detection system is mainly used to detect internal attacks in organization. Machine leaning techniques are mostly used to implement intrusion detection system.  ...  ., [14] have proposed a stacking ensemble method for intrusion detection system. They have stacked four base classifiers to implement real time intrusion detection system.  ... 
doi:10.5815/ijcnis.2021.04.03 fatcat:z7ptow573rduzbga7d5z2vrgmq

Network and information security: A computational intelligence approach

Ajith Abraham, Kate Smith, Ravi Jain, Lakhmi Jain
2007 Journal of Network and Computer Applications  
Authors evaluated three fuzzy rule based classifiers to detect intrusions in a network.  ...  Decision Trees (DT) and Support Vector Machines (SVM) are combined as a hierarchical hybrid intelligent system model (DT-SVM) and an ensemble approach combining the base classifiers.  ... 
doi:10.1016/j.jnca.2005.06.004 fatcat:qwqxsxofzrehrojed2hjwawj3m

Hybrid Architecture for Distributed Intrusion Detection System Using Semi-supervised Classifiers in Ensemble Approach

Shraddha R. Khonde, Venugopal Ulagamuthalvi
2020 Advances in Modelling and Analysis B  
Security to the network is provided using Intrusion Detection System (IDS) which helps to monitor and analyze each packet entering or passing through the network.  ...  In this paper hybrid architecture for IDS is proposed which can work as an intelligent system in distributed environment.  ...  Intrusion detection system mostly provides a supplementary protection to the firewall as is not the alternative for it [1] .  ... 
doi:10.18280/ama_b.631-403 fatcat:bpj4rjnqwvgtbpaiywubuktpb4

Modeling intrusion detection system using hybrid intelligent systems

Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson Thomas
2007 Journal of Network and Computer Applications  
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS).  ...  Decision trees (DT) and support vector machines (SVM) are combined as a hierarchical hybrid intelligent system model (DT-SVM) and an ensemble approach combining the base classifiers.  ...  The second approach uses the neural network as a stand alone misuse detection system. In this method, the neural network receivse data from the network stream and analyzes it for misuse intrusion.  ... 
doi:10.1016/j.jnca.2005.06.003 fatcat:cvywgk5t6fevvk5u7fl72hz42m
« Previous Showing results 1 — 15 out of 2,379 results