Unsupervised anomaly intrusion detection via localized bayesian feature selection

W Fan, N Bouguila, D Ziou - 2011 IEEE 11th International …, 2011 - ieeexplore.ieee.org
In recent years, an increasing number of security threats have brought a serious risk to the
internet and computer networks. Intrusion Detection System (IDS) plays a vital role in …

Anomaly intrusion detection system using Gaussian mixture model

M Bahrololum, M Khaleghi - 2008 Third International …, 2008 - ieeexplore.ieee.org
Intrusion Detection Systems have been widely used to overcome security threats in
computer networks and to identify unauthorized use, misuse, and abuse of computer …

Intrusion detection based on K-Means clustering and Naïve Bayes classification

Z Muda, W Yassin, MN Sulaiman… - 2011 7th international …, 2011 - ieeexplore.ieee.org
Intrusion Detection System (IDS) plays an effective way to achieve higher security in
detecting malicious activities for a couple of years. Anomaly detection is one of intrusion …

An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification

SK Sharma, P Pandey, SK Tiwari… - … on Advances In …, 2012 - ieeexplore.ieee.org
As network attacks have increased in number and severity over the past few years, intrusion
detection system (IDS) is increasingly becoming a critical component to secure the network …

[PDF][PDF] Anomaly intrusion detection system using hierarchical gaussian mixture model

M Bahrololum, M Khaleghi - … journal of computer science and network …, 2008 - academia.edu
Summary Intrusion Detection Systems have been widely used to overcome security threats
in computer networks and to identify unauthorized use, misuse, and abuse of computer …

Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection

W Alhakami, A ALharbi, S Bourouis, R Alroobaea… - IEEE …, 2019 - ieeexplore.ieee.org
Anomaly-based intrusion detection systems (IDSs) have been deployed to monitor network
activity and to protect systems and the Internet of Things (IoT) devices from attacks (or …

Using naive Bayes with AdaBoost to enhance network anomaly intrusion detection

W Li, QX Li - 2010 Third International Conference on Intelligent …, 2010 - ieeexplore.ieee.org
Classical intrusion detection system tends to identify attacks by using a set of rules known as
signatures defined before the attack, this kind of detection is known as misuse intrusion …

An unsupervised anomaly detection approach using subtractive clustering and hidden markov model

C Yang, F Deng, H Yang - 2007 Second International …, 2007 - ieeexplore.ieee.org
Previous Research in network intrusion detection system (NIDS) has typically used misuse
detection or supervised anomaly detection techniques. These techniques have difficulty in …

A new data mining based hybrid network Intrusion Detection model

V Barot, D Toshniwal - … on Data Science & Engineering (ICDSE …, 2012 - ieeexplore.ieee.org
Intrusion Detection System (IDS) plays an effective role to achieve higher security in
detecting malicious activities, for a couple of years. To cope up with the requirements of …

Incremental anomaly-based intrusion detection system using limited labeled data

P Alaei, F Noorbehbahani - 2017 3th International Conference …, 2017 - ieeexplore.ieee.org
With the proliferation of the internet and increased global access to online media,
cybercrime is also occurring at an increasing rate. Currently, both personal users and …