A two-level hybrid approach for intrusion detection

C Guo, Y Ping, N Liu, SS Luo - Neurocomputing, 2016 - Elsevier
To exploit the strengths of misuse detection and anomaly detection, an intensive focus on
intrusion detection combines the two. From a novel perspective, in this paper, we proposed …

[HTML][HTML] A hybrid network intrusion detection framework based on random forests and weighted k-means

RM Elbasiony, EA Sallam, TE Eltobely… - Ain Shams Engineering …, 2013 - Elsevier
Many current NIDSs are rule-based systems, which are very difficult in encoding rules, and
cannot detect novel intrusions. Therefore, a hybrid detection framework that depends on …

An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks

O Depren, M Topallar, E Anarim, MK Ciliz - Expert systems with …, 2005 - Elsevier
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both
anomaly and misuse detection approaches. This hybrid Intrusion Detection System …

[PDF][PDF] Anomaly detection analysis of intrusion data using supervised & unsupervised approach.

P Gogoi, B Borah, DK Bhattacharyya - J. Convergence Inf. Technol., 2010 - Citeseer
Anomaly based network intrusion detection (ANID) is an important problem that has been
researched within diverse research areas and various application domains. Several …

A review of machine learning based anomaly detection techniques

H Kaur, G Singh, J Minhas - arXiv preprint arXiv:1307.7286, 2013 - arxiv.org
Intrusion detection is so much popular since the last two decades where intrusion is
attempted to break into or misuse the system. It is mainly of two types based on the …

[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

G Kim, S Lee, S Kim - Expert Systems with Applications, 2014 - Elsevier
In this paper, a new hybrid intrusion detection method that hierarchically integrates a misuse
detection model and an anomaly detection model in a decomposition structure is proposed …

Network anomaly detection based on TCM-KNN algorithm

Y Li, B Fang, L Guo, Y Chen - Proceedings of the 2nd ACM symposium …, 2007 - dl.acm.org
Intrusion detection is a critical component of secure information systems. Network anomaly
detection has been an active and difficult research topic in the field of Intrusion Detection for …

An anomaly intrusion detection method using the CSI-KNN algorithm

L Kuang, M Zulkernine - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
Machine learning-based anomaly detection approaches have attracted increasing attention
in the network intrusion detection community because of their intrinsic capabilities in …

Unsupervised clustering approach for network anomaly detection

I Syarif, A Prugel-Bennett, G Wills - … , NDT 2012, Dubai, UAE, April 24-26 …, 2012 - Springer
This paper describes the advantages of using the anomaly detection approach over the
misuse detection technique in detecting unknown network intrusions or attacks. It also …