An adapting soft computing model for intrusion detection system

HIH Alsaadi, RM ALmuttari, ON Ucan… - Computational …, 2022 - Wiley Online Library
… The complexity of soft computing is greatly reduced if the numbers of features in a … , soft
computing fuzzy logic system is proposed to enhance network security through intrusion detection

A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers

AN Toosi, M Kahani - Computer communications, 2007 - Elsevier
… Our future work will focus on reducing features for the classifiers by methods of feature
selection. Also, the work will be continued to study the fitness function of the genetic …

Incorporating soft computing techniques into a probabilistic intrusion detection system

SB Cho - IEEE Transactions on Systems, Man, and …, 2002 - ieeexplore.ieee.org
Reducing the size of measures means that … In this paper, the measure size is reduced based
on the locality of user ac… As a result of mapping of the measures, we can reduce the data. …

Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system

P Singh, S Krishnamoorthy, A Nayyar… - International …, 2019 - journals.sagepub.com
… for intrusion detection via deep learning method presented in this document followed similar
thinking. We use the hierarchical exploration and RNN-based model for classification based

D-SCIDS: Distributed soft computing intrusion detection system

A Abraham, R Jain, J Thomas, SY Han - Journal of Network and Computer …, 2007 - Elsevier
… We also demonstrated the importance of feature reduction to model lightweight intrusion
detection systems. Finally, we propose a hybrid architecture involving ensemble and base …

Soft computing-based intrusion detection approaches: an analytical study

D Neelima, J Karthik, K Aravind John… - Soft Computing in Data …, 2019 - Springer
… and reduced KDD Cup 99 datasets shows that identified reduced data performance is
better than featured dataset. Some other neural network-based approaches developed for IDS …

The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
… et al.’s work, a potential function clustering method was used between the first and second
layer. This clustering algorithm significantly reduced the dimensions seen by neurons in the …

Intrusion detection using ensemble of soft computing paradigms

S Mukkamala, AH Sung, A Abraham - Intelligent systems design and …, 2003 - Springer
Soft computing techniques are increasingly being … soft computing techniques for intrusion
detection. Due to increasing incidents of cyber attacks, building effective intrusion detection

RETRACTED ARTICLE: IoT-based smart environment using intelligent intrusion detection system

G Kalnoor, S Gowrishankar - Soft Computing, 2021 - Springer
… work is to design and form the intelligent intrusion detection system (I-IDS) using the … turn
decrease the performance of the protocol applied to the deployed system of intrusion detection. …

Soft computingbased intrusion detection system with reduced false positive rate

DG Bhatti, PV Virparia - … and Analysis of Security Protocol for …, 2020 - Wiley Online Library
… From additional network configuration details provided by intrusion detection administrator,
we can reduce ambiguous area. But this raises another challenge of dealing with multiple …