The intrusion detection model based on parallel multi-artificial bee colony and support vector machine

L Li, S Zhang, Y Zhang, L Chang… - … Conference on Advanced …, 2019 - ieeexplore.ieee.org
In view of the problems existing in feature selection and support vector machine model
parameter optimization in network intrusion detection, artificial bee colony algorithm is …

Identification of cybersecurity elements based on convolutional attention LSTM networks

Y Hu, R Liu, Z Ma - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
As the first step of cybersecurity situational awareness, the accuracy of cybersecurity
element recognition will directly affect the results of situational understanding and situational …

Application and performance analysis of data preprocessing for intrusion detection system

S Jiang, X Xu - Science of Cyber Security: Second International …, 2019 - Springer
In the era of network and big data, network information security has become a major issue.
Intrusion Detection System (IDS) is an essential component of network security facilities …

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques

F Salo - 2019 - search.proquest.com
The enormous development in the connectivity among different type of networks poses
significant concerns in terms of privacy and security. As such, the exponential expansion in …

Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach

PN Rabadia - 2018 - ro.ecu.edu.au
This thesis investigates a precise and efficient pattern-based intrusion detection approach
by extracting patterns from sequential adversarial commands. As organisations are further …

Research on Effectiveness Evaluation Model of Intrusion Detection System based on Cost and Performance

J Cheng, L Wang, G Jia, Q Liu - 2020 IEEE 9th Joint …, 2020 - ieeexplore.ieee.org
Simulation is a common method to study intrusion detection system. A large amount of
simulation results will be generated during the simulation operation. How to effectively …

Hyper-bag-graphs and their applications: Modeling, Analyzing and Visualizing Complex Networks of Co-occurrences

XE Ouvrard - cds.cern.ch
Obtaining insights in the tremendous amount of data in which the Big Data era has brought
us, requires to develop specific tools, that are not only summaries of data through classical …

[PDF][PDF] An Improved Feed Forward Neural Network using Salp Swarm Optimization technique for the design of Intrusion Detection System for Computer Network

VS Sriram - researchgate.net
Due to the drastic increase in the rate of cyber attacks, network security has become the
highest priority in the recent technological era. As the cyber attacks have become more …

[PDF][PDF] An Efficient Feature Selection Approach for Network-based Intrusion Detection System Using Machine Learning Algorithm

Y Pandey, S Singh - ijtrm.com
Network-based intrusion detection systems (NIDS) have become important and widely used
tools for ensuring network security. Processing huge amount of audit data is a challenging …

[PDF][PDF] Intrusion detection system based on hypergraph feature reduction and convolutional neural network

T Wang - journal.it.cas.cz
Since computer network detection is concealed and diverse, it is difficult to carry out network
intrusion detection. In order to improve the detection effect of LSSVM in the abnormal …