A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine

MRG Raman, N Somu, K Kirthivasan, R Liscano… - Knowledge-Based …, 2017 - Elsevier
Realization of the importance for advanced tool and techniques to secure the network
infrastructure from the security risks has led to the development of many machine learning …

An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm

MR Gauthama Raman, N Somu, S Jagarapu… - Artificial Intelligence …, 2020 - Springer
Abstract 'Curse of Dimensionality'and the trade-off between high detection rate and less
false alarm rate make the design of an efficient and robust Intrusion Detection System, an …

A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems

MRG Raman, N Somu, K Kirthivasan, VSS Sriram - Neural Networks, 2017 - Elsevier
Over the past few decades, the design of an intelligent Intrusion Detection System (IDS)
remains an open challenge to the research community. Continuous efforts by the …

MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection …

D Aksu, MA Aydin - Computers & Security, 2022 - Elsevier
Controller area network (CAN) bus which provides efficient, reliable and robust
communication between electronic control units (ECUs) is the most frequently used protocol …

A trust centric optimal service ranking approach for cloud service selection

N Somu, GR MR, K Kirthivasan, SS VS - Future Generation Computer …, 2018 - Elsevier
Cloud service selection, a promising research directive provides an intelligent solution via.
service ranking based on the Quality of Service (QoS) attributes for the identification of …

Feature selection algorithms in intrusion detection system: A survey

S Maza, M Touahria - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
Regarding to the huge number of connections and the large flow of data on the Internet,
Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and …

Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection

J Liu, W Zhang, Z Tang, Y Xie, T Ma, J Zhang… - Expert Systems with …, 2020 - Elsevier
In this paper, an adaptive network intrusion detection method using fuzzy rough set-based
feature selection and GA-GOGMM-based pattern learning is presented. Based on the fuzzy …

An improved robust heteroscedastic probabilistic neural network based trust prediction approach for cloud service selection

N Somu, GR MR, V Kalpana, K Kirthivasan, SS VS - Neural Networks, 2018 - Elsevier
Trustworthiness is a comprehensive quality metric which is used to assess the quality of the
services in service-oriented environments. However, trust prediction of cloud services based …