AC Enache, VV Patriciu - 2014 IEEE 9th IEEE international …, 2014 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) have become a necessary component of almost every security infrastructure. Recently, Support Vector Machines (SVM) has been employed to …
SJ Horng, MY Su, YH Chen, TW Kao, RJ Chen… - Expert systems with …, 2011 - Elsevier
This study proposed an SVM-based intrusion detection system, which combines a hierarchical clustering algorithm, a simple feature selection procedure, and the SVM …
C Guo, Y Zhou, Y Ping, Z Zhang, G Liu, Y Yang - Applied intelligence, 2014 - Springer
Intrusion detection systems based on a hybrid approach have attracted considerable interest from researchers. Hybrid classifiers are able to provide improved detection accuracy, but …
S Zaman, F Karray - 2009 6th IEEE consumer communications …, 2009 - ieeexplore.ieee.org
Intrusion detection systems (EDSs) deal with large amounts of data containing irrelevant and/or redundant features. These features result in a slow training and testing process …
H Saxena, V Richariya - International Journal of Computer Applications, 2014 - Citeseer
Intrusion detection is a process of identifying the Attacks in the networks. The main aim of IDS is to identify the Normal and Intrusive activities. In recent years, many researchers are …
The growing prevalence of network attacks is a well-known problem which can impact the availability, confidentiality, and integrity of critical information for both individuals and …
Y Shen, K Zheng, C Wu, M Zhang, X Niu… - The Computer …, 2018 - academic.oup.com
Abstract Machine learning plays an important role in constructing intrusion detection models. However, the information era is an era of data. With the continuous increase in data size and …
Network attacks have become more pervasive in the cyber world. There are various attacks such as denial of service, scanning, privilege escalation that is increasing day by day …
The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with many features …