Efficient decision tree for protocol analysis in intrusion detection

T Abbes, A Bouhoula… - International Journal of …, 2010 - inderscienceonline.com
Pattern matching is a crucial factor for deriving efficient intrusion detection. However
Network Intrusion Detection Systems (NIDSs) frequently ignore data semantics of captured …

[PDF][PDF] A computational intelligence for evaluation of intrusion detection system

J Visumathi… - Indian Journal …, 2011 - sciresol.s3.us-east-2.amazonaws …
Intrusion detection system work at many levels in the network fabric and are taking the
concept of security to a whole new sphere by incorporating intelligence as a tool to protect …

Fuzzy rule-base based intrusion detection system on application layer

S Sangeetha, S Haripriya, SG Mohana Priya… - Recent Trends in …, 2010 - Springer
The objective of this paper is to develop a Fuzzy Rule-Base Based Intrusion Detection
System on Application Layer which works in the application layer of the network stack …

[PDF][PDF] The Practical Data Mining Model for Efficient IDS Through Relational Databases

MS Vittapu, V Sunkari, AY Abate - International Journal of Research …, 2015 - academia.edu
Enterprise network information system is not only the platform for information sharing and
information exchanging, but also the platform for enterprise production automation system …

[DOC][DOC] Intrusion detection system

V Katkar, S Shukla, A Reshamwala - … International Conference on …, 2010 - researchgate.net
Intrusion detection system is one of the widely used tools for defense in Computer Networks.
In literature, plenty of research is published on Intrusion Detection Systems. In this paper we …

An Efficient Intrusion Detection System using Computational Intelligence

J Visumathi… - National Journal of System …, 2010 - search.proquest.com
Intrusion detection system is one of the widely used tools for defense in Computer Networks.
In literature, plenty of research is published on Intrusion Detection Systems. In this paper we …