Detection of Cyber Attacks by using Gray Wolf Optimizer

D Srivastava, S Hooda, R Gill… - … Conference on Intelligent …, 2023 - ieeexplore.ieee.org
A feature selection algorithm examines the data to weed out distracting, extraneous
information while improving classification accuracy. The finest feature subgroup for …

[PDF][PDF] Anomaly based Real Time Prevention of under rated App-DDOS attacks on web: An experiential metrics based machine learning approach

KM Prasad, ARM Reddy… - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
To devise an Anomaly based Real Time Prevention (ARTP) of under rated App-DDOS
attacks on Web for achieving fast and early detection. Method: We proposed a model based …

Soft computing‐based intrusion detection system with reduced false positive rate

DG Bhatti, PV Virparia - … and Analysis of Security Protocol for …, 2020 - Wiley Online Library
Summary Intrusion Detection System is one of the important security mechanisms in today's
information era. Two different approaches are used for intrusion detection: signature based …

PDA-CS: Profile distance assessment-centric cuckoo search for anomaly-based intrusion detection in high-speed networks

KR Gariga, ARM Reddy, NS Rao - … of the 5th International Conference on …, 2017 - Springer
The act of network intrusion detection is an obligatory part of network performance under
security. Unlike other network security strategies, the act of intrusion detection systems …

[PDF][PDF] Data preprocessing for reducing false positive rate in intrusion detection

DG Bhatti, PV Virparia - International Journal of Computer Applications, 2012 - Citeseer
Intrusion detection plays vital role in computer network security since long. Experience has
shown that most IDS struggle for curbing false positive rate. As part of our proposed model …

[图书][B] Network Intrusion Detection with Sensor Fusion: Performance Bounds and Benchmarks

N Nokuthala, P Mkuzangwe - 2020 - search.proquest.com
The achievable performances of intrusion detection systems are unknown beforehand.
Currently, intrusion detection researchers implement these systems before they can …

[PDF][PDF] MC-CSO: PERFORMANCE ANALYSIS AND DETECTING THE INTRUSION DETECTION SYSTEM USING SWARM TECHNIQUE

B Subbulakshmi, E Ramaraj - ijetcse.com
Intrusion Detection System plays a crucial role in security oriented systems that tracks and
records the real time data which leads to dimensionality reduction, multiclass oriented …

[PDF][PDF] CHID: CONDITIONAL HYBRID INTRUSION DETECTION SYSTEM FOR REDUCING FALSE POSITIVES AND RESOURCE CONSUMPTION ON MALICOUS …

HM ALAIDAROS - core.ac.uk
Inspecting packets to detect intrusions faces challenges when coping with a high volume of
network traffic. Packet-based detection processes every payload on the wire, which …

[PDF][PDF] Honey Pot Intrusion Detection System

K Maseno - academia.edu
Cyber Warfare is the current single greatest emerging threat to National Security. Network
security has become an essential component of any computer network. As computer …

[PDF][PDF] Conditional hybrid approach for intrusion detection

H Alaidaros, M Mahmuddin - Research Journal of Information …, 2016 - academia.edu
Abstract Background and Objective: Inspecting all packets to detect intrusions faces
challenges when coping with a high volume of traffic. Packet-based detection processes …