A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Review On Soft Computing Technique In Intrusion Detection System
2012
Zenodo
In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. ...
Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. ...
Genetic Algorithm In feature selection of Intrusion Detection, the SNFS [35] algorithm used Neural network and Support Vector Machine. ...
doi:10.5281/zenodo.1081294
fatcat:dcqahrll4fcuvoon7a37erx3mm
Feature Selection Algorithms in Intrusion Detection System: A Survey
2018
KSII Transactions on Internet and Information Systems
In this paper, we introduce a survey of feature selection algorithms for intrusion detection system. We describe the well-known approaches that have been proposed in FS for IDS. ...
Feature Selection (FS) is the important technique, which gives the issue for enhancing the performance of detection. ...
into feature selection for intrusion detection depending to this taxonomy. ...
doi:10.3837/tiis.2018.10.024
fatcat:c4erbjt2v5dv5l2gbihrmr575q
Network intrusion detection by artificial immune system
2011
IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society
An improved AIS based IDS with these two feature selection algorithms are studied. ...
In this thesis, an Artificial Immune System (AIS) based intrusion detection is explored. ...
In this paper, an improved AIS based intrusion detection system with Rough Set feature selection algorithm is presented. ...
doi:10.1109/iecon.2011.6119993
fatcat:n2khqynoxbb23fussr33eqollu
A Novel Method to Enhance the Security of Computer System using AIS in Intrusion Detection System
2017
International Journal of Advanced Research in Computer Science and Software Engineering
To improve the security of computer system various approaches have been proposed from different areas. One such approach is make a use of AIS in Intrusion Detection System. ...
To detect the anomaly problems and unnoticed intruders, negative selection algorithm method is found more suitable than K-Mean Clustering method. ...
Algorithm was aimed for improve the detection rate, novelty detection, intrusion detection and similar pattern recognition and two-class categorization problem fields. ...
doi:10.23956/ijarcsse/sv7i5/0195
fatcat:3msmoejrqvduxfjulfm62lojle
The use of computational intelligence in intrusion detection systems: A review
2010
Applied Soft Computing
Here we want to provide an overview of the research progress in applying CI methods to the problem of intrusion detection. ...
Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. ...
As an application, this algorithm was used to detect intrusions in Ad-Hoc networks [26] . ...
doi:10.1016/j.asoc.2009.06.019
fatcat:5ntbfbejrveyzhmmelfh34qkiy
An intrusion detection method for internet of things based on suppressed fuzzy clustering
2018
EURASIP Journal on Wireless Communications and Networking
In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component ...
At the same time, the self-adjustment of the detection frequency is carried out according to the suppressed fuzzy clustering algorithm and the principal component analysis algorithm. ...
An improved multi-objective genetic algorithm-based intrusion detection integrated method has been proposed [16] . ...
doi:10.1186/s13638-018-1128-z
fatcat:qmd6tmn4rfctnn7osb4f2e4y2e
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP
2017
KSII Transactions on Internet and Information Systems
effectively improves the intrusion detection performance. ...
In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved. ...
Negative Selection Algorithm (NSA), which is one of the most well-known immune inspired algorithm, has been widely used in intrusion detection [4] . ...
doi:10.3837/tiis.2017.11.022
fatcat:kis324pdqfblhesbuekmoueize
Auto-Immunity Dendritic Cell Algorithm
2016
International Journal of Computer Applications
This paper presents a systematic approach to intrusion detection using artificial immune system (Dendritic Cell) to purging in order to avoid attack subversion and autoimmunity on network. ...
This is assessed through the algorithm"s application to the detection of intrusion and classification problems. ...
Steps taking in producing vaccine for an auto-immunity dendritic cell algorithm: a. ...
doi:10.5120/ijca2016908689
fatcat:3mtylz4sl5audffclbtugt4efi
Applications and Evaluations of Bio-Inspired approaches in Cloud Security: A Review
2020
IEEE Access
Among those, bio-inspired algorithms such as Evolutionary, Swarm, Immune, and Neural algorithms are the most prominent ones which are developed based on nature's ecosystems. ...
Therefore, this study provides an overview of bio-inspired algorithms application and evaluations, taking into account cloud security challenges, ...
On the other hand, Wang et al. (2018) [80] proposed an improved Immune algorithm for industrial cloud storage. ...
doi:10.1109/access.2020.3027841
fatcat:f4ufhhyuivfinjraxe2whjdo4a
Modified Artificial immune system as Feature Selection
2018
Iraqi Journal of Science
Feature selection algorithms play a big role in machine learning applications. There are several feature selection strategies based on metaheuristic algorithms. ...
In this paper a feature selection strategy based on Modified Artificial Immune System (MAIS) has been proposed. ...
The algorithm was used to fix various real-life engineering multi-objective optimization issues. ...
doi:10.24996/ijs.2018.59.2a.11
fatcat:dcc2jrcyhvf3hjc7izg7cbm6ne
Machine Learning Techniques for Intrusion Detection
[article]
2015
arXiv
pre-print
An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers for malicious activities (attacks) that are aimed at stealing or censoring information or corrupting network ...
We explain how various characteristics of CI techniques can be used to build efficient IDS. ...
They summarize six immune features that are desirable for an effective IDS: distributed, multi-layered, self-organised, lightweight, diverse and disposable. ...
arXiv:1312.2177v2
fatcat:sfl6yaafjnb5lpg7i5mcbptjxa
Investigations on Bio-Inspired Algorithm for Network Intrusion Detection – A Review
2022
International Journal of Computer Networks And Applications
This paper investigates the feature selection techniques of bio-inspired algorithmsdriven Intrusion Detection Systems. ...
This paper categorises these SI approaches based on their applicability in improving various aspects of an intrusion detection process. ...
Multi-objective ID models are Classification, feature selection, weight selection/optimization among them [53] [54] . ...
doi:10.22247/ijcna/2022/214503
fatcat:jdexzrwqbbbbrng7yvmpezkm6q
Intrusion Detection System Based on Artificial Immune System for Wireless Sensor Network
2008
The International Conference on Electrical Engineering
In this paper we develop an intrusion detection system that is inspired by the Biological Immune System (BIS). The idea is to map BIS elements for the detection system in WSN. ...
Intrusion Detection System (IDS) is a must for this critical application. Providing adaptive new intrusion detection systems remain a challenging research problem. ...
EE189 -14 wireless sensor networks using intelligent technology. We should be able to make wireless sensor networks much more secure than they currently are. ...
doi:10.21608/iceeng.2008.34243
fatcat:btx6zs3ysjdi7mq7sdiitnnkqe
Cuckoo Optimisation based Intrusion Detection System for Cloud Computing
2018
International Journal of Computer Network and Information Security
This detective control mechanism is established using intrusion detection system (IDS). ...
Hence, this paper proposed a cuckoo optimisation-based method to preprocess the network traffic data for improving the detection accuracy of the IDS for cloud security. ...
Hence, this paper presents an intrusion detection model that is developed using the machine-learning algorithm such as naï ve Bayes classifier. ...
doi:10.5815/ijcnis.2018.11.05
fatcat:omysqj2hzrcptlsuaizccikf74
Towards a Hybrid Immune Algorithm based on Danger Theory for Database Security
2020
IEEE Access
In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system ...
In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects. ...
' immunity degree and user privileges. • Designing and implementing an intrusion detection algorithm for detecting a database of abnormal user behavior. • Improving Detection Rate (DR) with low FP and ...
doi:10.1109/access.2020.3015399
fatcat:b3owuaoj35gurdnzhu5tfuxjgi
« Previous
Showing results 1 — 15 out of 3,240 results