Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,240 Hits in 6.9 sec

A Review On Soft Computing Technique In Intrusion Detection System

Noor Suhana Sulaiman, Rohani Abu Bakar, Norrozila Sulaiman
2012 Zenodo  
In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security.  ...  Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible.  ...  Genetic Algorithm In feature selection of Intrusion Detection, the SNFS [35] algorithm used Neural network and Support Vector Machine.  ... 
doi:10.5281/zenodo.1081294 fatcat:dcqahrll4fcuvoon7a37erx3mm

Feature Selection Algorithms in Intrusion Detection System: A Survey

2018 KSII Transactions on Internet and Information Systems  
In this paper, we introduce a survey of feature selection algorithms for intrusion detection system. We describe the well-known approaches that have been proposed in FS for IDS.  ...  Feature Selection (FS) is the important technique, which gives the issue for enhancing the performance of detection.  ...  into feature selection for intrusion detection depending to this taxonomy.  ... 
doi:10.3837/tiis.2018.10.024 fatcat:c4erbjt2v5dv5l2gbihrmr575q

Network intrusion detection by artificial immune system

Junyuan Shen, Jidong Wang
2011 IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society  
An improved AIS based IDS with these two feature selection algorithms are studied.  ...  In this thesis, an Artificial Immune System (AIS) based intrusion detection is explored.  ...  In this paper, an improved AIS based intrusion detection system with Rough Set feature selection algorithm is presented.  ... 
doi:10.1109/iecon.2011.6119993 fatcat:n2khqynoxbb23fussr33eqollu

A Novel Method to Enhance the Security of Computer System using AIS in Intrusion Detection System

Sharad Gangele, Anshuman Sharma
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
To improve the security of computer system various approaches have been proposed from different areas. One such approach is make a use of AIS in Intrusion Detection System.  ...  To detect the anomaly problems and unnoticed intruders, negative selection algorithm method is found more suitable than K-Mean Clustering method.  ...  Algorithm was aimed for improve the detection rate, novelty detection, intrusion detection and similar pattern recognition and two-class categorization problem fields.  ... 
doi:10.23956/ijarcsse/sv7i5/0195 fatcat:3msmoejrqvduxfjulfm62lojle

The use of computational intelligence in intrusion detection systems: A review

Shelly Xiaonan Wu, Wolfgang Banzhaf
2010 Applied Soft Computing  
Here we want to provide an overview of the research progress in applying CI methods to the problem of intrusion detection.  ...  Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community.  ...  As an application, this algorithm was used to detect intrusions in Ad-Hoc networks [26] .  ... 
doi:10.1016/j.asoc.2009.06.019 fatcat:5ntbfbejrveyzhmmelfh34qkiy

An intrusion detection method for internet of things based on suppressed fuzzy clustering

Liqun Liu, Bing Xu, Xiaoping Zhang, Xianjun Wu
2018 EURASIP Journal on Wireless Communications and Networking  
In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component  ...  At the same time, the self-adjustment of the detection frequency is carried out according to the suppressed fuzzy clustering algorithm and the principal component analysis algorithm.  ...  An improved multi-objective genetic algorithm-based intrusion detection integrated method has been proposed [16] .  ... 
doi:10.1186/s13638-018-1128-z fatcat:qmd6tmn4rfctnn7osb4f2e4y2e

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP

2017 KSII Transactions on Internet and Information Systems  
effectively improves the intrusion detection performance.  ...  In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved.  ...  Negative Selection Algorithm (NSA), which is one of the most well-known immune inspired algorithm, has been widely used in intrusion detection [4] .  ... 
doi:10.3837/tiis.2017.11.022 fatcat:kis324pdqfblhesbuekmoueize

Auto-Immunity Dendritic Cell Algorithm

Olubadeji Bukola, Adetunmbi A.O.
2016 International Journal of Computer Applications  
This paper presents a systematic approach to intrusion detection using artificial immune system (Dendritic Cell) to purging in order to avoid attack subversion and autoimmunity on network.  ...  This is assessed through the algorithm"s application to the detection of intrusion and classification problems.  ...  Steps taking in producing vaccine for an auto-immunity dendritic cell algorithm: a.  ... 
doi:10.5120/ijca2016908689 fatcat:3mtylz4sl5audffclbtugt4efi

Applications and Evaluations of Bio-Inspired approaches in Cloud Security: A Review

Md Manjurul Ahsan, Kishor Datta Gupta, Abhijit Kumar Nag, Subash Pouydal, Abbas Z. Kouzani, M A Parvez Mahmud
2020 IEEE Access  
Among those, bio-inspired algorithms such as Evolutionary, Swarm, Immune, and Neural algorithms are the most prominent ones which are developed based on nature's ecosystems.  ...  Therefore, this study provides an overview of bio-inspired algorithms application and evaluations, taking into account cloud security challenges,  ...  On the other hand, Wang et al. (2018) [80] proposed an improved Immune algorithm for industrial cloud storage.  ... 
doi:10.1109/access.2020.3027841 fatcat:f4ufhhyuivfinjraxe2whjdo4a

Modified Artificial immune system as Feature Selection

2018 Iraqi Journal of Science  
Feature selection algorithms play a big role in machine learning applications. There are several feature selection strategies based on metaheuristic algorithms.  ...  In this paper a feature selection strategy based on Modified Artificial Immune System (MAIS) has been proposed.  ...  The algorithm was used to fix various real-life engineering multi-objective optimization issues.  ... 
doi:10.24996/ijs.2018.59.2a.11 fatcat:dcc2jrcyhvf3hjc7izg7cbm6ne

Machine Learning Techniques for Intrusion Detection [article]

Mahdi Zamani, Mahnush Movahedi
2015 arXiv   pre-print
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers for malicious activities (attacks) that are aimed at stealing or censoring information or corrupting network  ...  We explain how various characteristics of CI techniques can be used to build efficient IDS.  ...  They summarize six immune features that are desirable for an effective IDS: distributed, multi-layered, self-organised, lightweight, diverse and disposable.  ... 
arXiv:1312.2177v2 fatcat:sfl6yaafjnb5lpg7i5mcbptjxa

Investigations on Bio-Inspired Algorithm for Network Intrusion Detection – A Review

Jeyavim Sherin R C, Parkavi K
2022 International Journal of Computer Networks And Applications  
This paper investigates the feature selection techniques of bio-inspired algorithmsdriven Intrusion Detection Systems.  ...  This paper categorises these SI approaches based on their applicability in improving various aspects of an intrusion detection process.  ...  Multi-objective ID models are Classification, feature selection, weight selection/optimization among them [53] [54] .  ... 
doi:10.22247/ijcna/2022/214503 fatcat:jdexzrwqbbbbrng7yvmpezkm6q

Intrusion Detection System Based on Artificial Immune System for Wireless Sensor Network

M. Shedid, R. Abo Alez, A. E l-Hennawy
2008 The International Conference on Electrical Engineering  
In this paper we develop an intrusion detection system that is inspired by the Biological Immune System (BIS). The idea is to map BIS elements for the detection system in WSN.  ...  Intrusion Detection System (IDS) is a must for this critical application. Providing adaptive new intrusion detection systems remain a challenging research problem.  ...  EE189 -14 wireless sensor networks using intelligent technology. We should be able to make wireless sensor networks much more secure than they currently are.  ... 
doi:10.21608/iceeng.2008.34243 fatcat:btx6zs3ysjdi7mq7sdiitnnkqe

Cuckoo Optimisation based Intrusion Detection System for Cloud Computing

D. Asir Antony Gnana Singh, Anna University, BIT-Campus, Tiruchirappalli, Tamil Nadu, India, R. Priyadharshini, E. Jebamalar Leavline
2018 International Journal of Computer Network and Information Security  
This detective control mechanism is established using intrusion detection system (IDS).  ...  Hence, this paper proposed a cuckoo optimisation-based method to preprocess the network traffic data for improving the detection accuracy of the IDS for cloud security.  ...  Hence, this paper presents an intrusion detection model that is developed using the machine-learning algorithm such as naï ve Bayes classifier.  ... 
doi:10.5815/ijcnis.2018.11.05 fatcat:omysqj2hzrcptlsuaizccikf74

Towards a Hybrid Immune Algorithm based on Danger Theory for Database Security

Wael Said, Ayman Mohamed Mostafa
2020 IEEE Access  
In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system  ...  In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects.  ...  ' immunity degree and user privileges. • Designing and implementing an intrusion detection algorithm for detecting a database of abnormal user behavior. • Improving Detection Rate (DR) with low FP and  ... 
doi:10.1109/access.2020.3015399 fatcat:b3owuaoj35gurdnzhu5tfuxjgi
« Previous Showing results 1 — 15 out of 3,240 results