[PDF][PDF] Intrusion detection system using genetic algorithm and data mining: An overview

VK Kshirsagar, SM Tidke, S Vishnu - International Journal of …, 2012 - researchgate.net
Network security is of primary concerned now days for large organizations. Various types of
Intrusion Detection Systems (IDS) are available in the market like Host based, Network …

[PDF][PDF] An anomaly-based approach for intrusion detection in web traffic

C Torrano-Giménez, A Perez-Villegas… - 2010 - core.ac.uk
A new system for web attack detection is presented. It follows the anomaly-based approach,
therefore known and unknown attacks can be detected. The system relies on a XML file to …

Machine learning techniques for web intrusion detection—a comparison

TS Pham, TH Hoang… - 2016 Eighth International …, 2016 - ieeexplore.ieee.org
The rapid development of web applications has created many security problems related to
intrusions not just on computer, network systems, but also on web applications themselves …

[PDF][PDF] A novel approach for genetic audio watermarking

M Zamani, AA Manaf, R Ahmad, F Jaryani… - Journal of Information …, 2010 - academia.edu
This paper presents a novel, principled approach to resolve the remained problems of
substitution technique of audio watermarking. Using the proposed genetic algorithm …

[PDF][PDF] Survey of current network intrusion detection techniques

R Srivastava, V Richhariya - Journal of Information Engineering and …, 2013 - academia.edu
The significance of network security has grown enormously and a number of devices have
been introduced to perk up the security of a network. NIDS is a retrofit approach for providing …

Genetic algorithm technique used to detect intrusion detection

P Gupta, SK Shinde - International Conference on Advances in Computing …, 2011 - Springer
The paper content is genetic algorithm based intrusion detection system. It is a simulation
type system comes under networking area. The first system in the line is an anomaly-based …

[PDF][PDF] Conceptual framework for soft computing based intrusion detection to reduce false positive rate

DG Bhatti, PV Virparia, B Patel - International Journal of Computer …, 2012 - researchgate.net
As the popularity and usage of Internet increases security concerns are also become
important. Everyone want to be connected to the world through Internet protecting own …

[PDF][PDF] Identifying the cost of security

W de Bruijn, MR Spruit, M van den Heuvel - Journal of Information …, 2010 - Citeseer
Organizations know that investing in security measures is an important requirement for
doing business. But how much should they invest and how should those investments be …

[PDF][PDF] Intrusion detection from heterogenous sensors

A Sadighian - 2015 - publications.polymtl.ca
De nos jours, la protection des systèmes et réseaux informatiques contre différentes
attaques avancées et distribuées constitue un défi vital pour leurs propriétaires. L'une des …

Cyber security threats detection using ensemble architecture

TS Chou - International Journal of Security and Its Applications, 2011 - earticle.net
This paper describes an ensemble design for cyber security threats detection, which fuses
the results from multiple classifiers together to make a final assessment decision. For …