An analysis of random forest algorithm based network intrusion detection system

YY Aung, MM Min - 2017 18th IEEE/ACIS International …, 2017 - ieeexplore.ieee.org
In the world today, the security of the computer system is of great importance, And in the last
few years, there have seen an affected growth in the amount of intrusions that intrusion …

[PDF][PDF] An analysis of K-means algorithm based network intrusion detection system

YY Aung, MM Min - Advances in Science, Technology and …, 2018 - academia.edu
In this modern age, information technology (IT) plays a role in a number of different fields.
And therefore, the role of security is very important to control and assist the flow of activities …

Random particle swarm optimization (RPSO) based intrusion detection system

R Patel, D Bakhshi, T Arjariya - International Journal of …, 2015 - search.proquest.com
Intrusion detection is a challenging area of research. As now there are several research
work are already done and the result improvement is in progress. In this paper a hybrid …

[PDF][PDF] An approach for efficient intrusion detection for KDD dataset: a survey

N Sharma, B Gaur - International Journal of Advanced Technology …, 2016 - academia.edu
Identifying possible attacks on the network system is a challenging task. There is several
research works are processed in this direction, but the need of improvement is always …

[PDF][PDF] Implementation of K-Means Clustering for Intrusion Detection

S Karim, PAY Rousanuzzaman, PH Khan… - International Journal of …, 2019 - academia.edu
Machine learning is embraced in an extensive variety of areas where it demonstrates its
predominance over customary lead based calculations. These strategies are being …

[PDF][PDF] Selective Iteration based Particle Swarm Optimization (SIPSO) for Intrusion Detection System

S Warsi, Y Rai, S Kushwaha - International Journal of Computer …, 2015 - Citeseer
In the current age Intrusion detection is an interest in and challenging area. As there are now
a few exploration works are as of now done and the outcome change is in advancement. In …

[PDF][PDF] Implementation of ML Algorithm's for Cyber Security

M Asif, EM Chirchi - 2021 - academia.edu
Machine learning is embraced in an extensive variety of areas where it demonstrates its
predominance over customary lead based calculations. These strategies are being …

[PDF][PDF] Alternatives to signatures (alts)

GM Jones, J Stogoski - CERT Coordination Center, Software …, 2014 - port111.com
This report by the CERT® Coordination Center, part of Carnegie Mellon University's
Software Engineering Institute, presents the results of a study of non-signature-based …

Defining adaptive whitelists by using clustering techniques, a security application to prevent toll fraud in voip networks

SIM Reyes, GR Salgado… - Proceedings of the …, 2016 - search.proquest.com
One strategy to prevent telephone fraud used by telephone operators is the so called White
list which is a set of international destinations where the user is allowed to call, it is by …

[PDF][PDF] Design of Intrusion Detection Model Based on FP-Growth and Dynamic Rule Generation with Clustering

M Somani, R Dubey - … Journal of Advanced Computer Research (IJACR) …, 2013 - Citeseer
Intrusion Detection is the process used to identify intrusions. If we think of the current
scenario then several new intrusion that cannot be prevented by the previous algorithm, IDS …