Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

A K-Means clustering and SVM based hybrid concept drift detection technique for network anomaly detection

M Jain, G Kaur, V Saxena - Expert Systems with Applications, 2022 - Elsevier
Today's internet data primarily consists of streamed data from various applications like
sensor networks, banking data and telecommunication data networks. A new field of study …

Ids using machine learning-current state of art and future directions

Y Hamid, M Sugumaran… - British Journal of …, 2016 - science.scholarsacademic.com
The prosperity of technology worldwide has made the concerns of security tend to increase
rapidly. The enormous usage of Internetworking has raised the need of protecting systems …

Research on time series data mining algorithm based on Bayesian node incremental decision tree

S Xingrong - Cluster Computing, 2019 - Springer
Aiming at the shortage of classic ID3 decision tree and C4. 5 decision tree algorithm in
ability of time series data mining, this paper increases Bayesian classification algorithm in …

AB-HT: An ensemble incremental learning algorithm for network intrusion detection systems

M Data, M Aritsugi - … Conference on Data Science and Its …, 2022 - ieeexplore.ieee.org
Most machine learning models used in network intrusion detection system (IDS) studies are
batch models which require all targeted intrusions to be present in the training data. This …

A classification and novel class detection algorithm for concept drift data stream based on the cohesiveness and separation index of Mahalanobis distance

X Li, Y Zhou, Z Jin, P Yu, S Zhou - Journal of Electrical and …, 2020 - Wiley Online Library
Data stream mining has become a research hotspot in data mining and has attracted the
attention of many scholars. However, the traditional data stream mining technology still has …

An improved Hoeffding-ID data-stream classification algorithm

C Yin, L Feng, L Ma - The Journal of Supercomputing, 2016 - Springer
Depending on the use of the Internet and network, data-stream classification has been
applied in the intrusion detection field. Due to unlimited and difficult storage features, the …

Integrating Big Data and Cloud Computing

A Singhal, J Madan, S Madan - Integration of Cloud Computing …, 2023 - taylorfrancis.com
The term “big data” originated in light of the exponential expansion of global data as a
technology capable of storing and handling massive volumes of data, providing companies …

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques

F Salo - 2019 - search.proquest.com
The enormous development in the connectivity among different type of networks poses
significant concerns in terms of privacy and security. As such, the exponential expansion in …

Machine Learning–Enabled Security Parameter Selection to Identify Attacks on the Cloud and Host

R Shankar, P Agrawal, V Madaan - Integration of Cloud Computing with … - taylorfrancis.com
The Internet has become such an important part of people's lives that they can't live without
it. It helps people with business, education, and entertainment, among other things, on …