A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Intrusion detection for IoT based on improved genetic algorithm and deep belief network

Y Zhang, P Li, X Wang - IEEE Access, 2019 - ieeexplore.ieee.org
With the advent of the Internet of Things (IoT), the security of the network layer in the IoT is
getting more and more attention. The traditional intrusion detection technologies cannot be …

A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

G Wang, J Hao, J Ma, L Huang - Expert systems with applications, 2010 - Elsevier
Many researches have argued that Artificial Neural Networks (ANNs) can improve the
performance of intrusion detection systems (IDS) when compared with traditional methods …

Practical real-time intrusion detection using machine learning approaches

P Sangkatsanee, N Wattanapongsakorn… - Computer …, 2011 - Elsevier
The growing prevalence of network attacks is a well-known problem which can impact the
availability, confidentiality, and integrity of critical information for both individuals and …

Анализ и классификация методов обнаружения сетевых атак

АА Браницкий, ИВ Котенко - Информатика и …, 2016 - proceedings.spiiras.nw.ru
Аннотация В работе рассматриваются различные методы обнаружения сетевых атак.
Основное внимание уделяется построению обобщенной классификационной схемы …

A survey of intrusion detection systems leveraging host data

RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …

Online adaboost-based parameterized methods for dynamic distributed network intrusion detection

W Hu, J Gao, Y Wang, O Wu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Current network intrusion detection systems lack adaptability to the frequently changing
network environments. Furthermore, intrusion detection in the new distributed architectures …

Hierarchical Kohonenen net for anomaly detection in network security

ST Sarasamma, QA Zhu, J Huff - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
A novel multilevel hierarchical Kohonen Net (K-Map) for an intrusion detection system is
presented. Each level of the hierarchical map is modeled as a simple winner-take-all K-Map …

Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers

AM Chandrasekhar… - … Conference on Computer …, 2013 - ieeexplore.ieee.org
With the impending era of internet, the network security has become the key foundation for
lot of financial and business web applications. Intrusion detection is one of the looms to …