Anomaly detection system in cloud environment using fuzzy clustering based ANN

N Pandeeswari, G Kumar - Mobile Networks and Applications, 2016 - Springer
Cloud computing affords lot of resources and computing facilities through Internet. Cloud
systems attract many users with its desirable features. In spite of them, Cloud systems may …

[PDF][PDF] Signature-Based Intrusion Detection System in Wireless 6G IoT Networks.

M Farooq, MH Khan - Journal on Internet of Things, 2022 - researchgate.net
An “Intrusion Detection System”(IDS) is a security measure designed to perceive and be
aware of unauthorized access or malicious activity on a computer system or network …

[PDF][PDF] An Intelligent CRF Based Feature Selection for Effective Intrusion Detection.

S Ganapathy, P Vijayakumar, P Yogesh… - International Arab Journal …, 2016 - iajit.org
As the internet applications are growing rapidly, the intrusions to the networking system are
also becoming high. In such a scenario, it is necessary to provide security to the networks by …

A survey of feature selection techniques in intrusion detection system: A soft computing perspective

P Ravi Kiran Varma, V Valli Kumari… - Progress in Computing …, 2018 - Springer
In the process of detecting different kinds of attacks in anomaly-based intrusion detection
system (IDS), both normal and attack data are profiled with the help of selected attributes …

[PDF][PDF] Snort-based smart and swift intrusion detection system

RF Olanrewaju, BUI Khan, AR Najeeb… - Indian Journal of …, 2018 - academia.edu
Objectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that
detects network attacks in less time after monitoring incoming traffic thus maintaining better …

[PDF][PDF] Intrusion detection using artificial neural networks with best set of features.

K Jayakumar, T Revathi, S Karpagam - International Arab Journal of …, 2015 - iajit.org
An Intrusion Detection System (IDS) monitors the behavior of a given environment and
identifies the activities are malicious (intrusive) or legitimate (normal) based on features …

[PDF][PDF] Detecting anomaly using neighborhood rough set based classification approach

FA Mazarbhuiya - ICIC Express Lett, 2023 - icicel.org
A vital field of research is network anomaly detection. Several research papers in this topic
have previously been published, using various methodologies or algorithms. The …

Implementation of classification and regression tree (CART) and fuzzy logic algorithm for intrusion detection system

AFA Pinem, EB Setiawan - 2015 3rd International Conference …, 2015 - ieeexplore.ieee.org
Intrusion detection system is a system that can detect the presence intrusion or attack in a
computer network. There are 2 type of intrusion detection system that misuse/signature …

Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection.

W Alsharafat - … Arab Journal of Information Technology (IAJIT …, 2013 - search.ebscohost.com
Due to increasing incidents of cyber attacks, building effective Intrusion Detection Systems
(IDS) are essential for protecting information systems security, and yet it remains an elusive …

[PDF][PDF] Dynamic fuzzy rule interpolation

N Naik - 2015 - research.aber.ac.uk
Designers of effective and efficient fuzzy systems have long recognised the value of
inferential hybridity in the implementation of sparse fuzzy rule based systems. Which is to …