An effective intrusion detection approach using SVM with naïve Bayes feature embedding
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An effective intrusion detection approach using SVM with naïve Bayes feature embedding
Authors
Keywords
Intrusion detection, Naïve Bayes, Feature embedding, Network security, Support vector machine
Journal
COMPUTERS & SECURITY
Volume 103, Issue -, Pages 102158
Publisher
Elsevier BV
Online
2020-12-25
DOI
10.1016/j.cose.2020.102158
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
- (2020) Gulshan Kumar et al. JOURNAL OF SUPERCOMPUTING
- One-class support vector classifiers: A survey
- (2020) Shamshe Alam et al. KNOWLEDGE-BASED SYSTEMS
- Application of intrusion detection technology in network safety based on machine learning
- (2020) Weijian Fang et al. SAFETY SCIENCE
- MaldomDetector: A system for detecting algorithmically generated domain names with machine learning
- (2020) Ahmad O. Almashhadani et al. COMPUTERS & SECURITY
- Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection
- (2019) Razan Abdulhammed et al. Electronics
- A new hybrid approach for intrusion detection using machine learning methods
- (2019) Ünal Çavuşoğlu APPLIED INTELLIGENCE
- Feature selection for imbalanced data based on neighborhood rough sets
- (2019) Hongmei Chen et al. INFORMATION SCIENCES
- Feature selection for intrusion detection using new multi-objective estimation of distribution algorithms
- (2019) Sofiane Maza et al. APPLIED INTELLIGENCE
- CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques
- (2019) Florian Gottwalt et al. COMPUTERS & SECURITY
- A hybrid BGWO with KPCA for intrusion detection
- (2019) S. Velliangiri JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE
- Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
- (2019) Zouhair Chiba et al. COMPUTERS & SECURITY
- A novel approach to intrusion detection using SVM ensemble with feature augmentation
- (2019) Jie Gu et al. COMPUTERS & SECURITY
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- Robust Adaptive Multivariate Hotelling's T2 Control Chart based on Kernel Density Estimation for Intrusion Detection System
- (2019) Muhammad Ahsan et al. EXPERT SYSTEMS WITH APPLICATIONS
- Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
- (2019) Arwa Aldweesh et al. KNOWLEDGE-BASED SYSTEMS
- A new intelligent intrusion detector based on ensemble of decision trees
- (2019) Seyed Morteza Mousavi et al. Journal of Ambient Intelligence and Humanized Computing
- An efficient feature selection based Bayesian and Rough set approach for intrusion detection
- (2019) Mahendra Prasad et al. APPLIED SOFT COMPUTING
- VARMAN: Multi-plane security framework for software defined networks
- (2019) Prabhakar Krishnan et al. COMPUTER COMMUNICATIONS
- Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
- (2019) Wisam Elmasry et al. Computer Networks
- Model of the intrusion detection system based on the integration of spatial-temporal features
- (2019) Jianwu Zhang et al. COMPUTERS & SECURITY
- Application of deep reinforcement learning to intrusion detection for supervised problems
- (2019) Manuel Lopez-Martin et al. EXPERT SYSTEMS WITH APPLICATIONS
- A hybrid deep learning model for efficient intrusion detection in big data environment
- (2019) Mohammad Mehedi Hassan et al. INFORMATION SCIENCES
- Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection
- (2018) R. Vijayanand et al. COMPUTERS & SECURITY
- Trust Aware Support Vector Machine Intrusion Detection and Prevention System in Vehicular Ad hoc Networks
- (2018) Erfan A. Shams et al. COMPUTERS & SECURITY
- An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities
- (2018) Amin Karami EXPERT SYSTEMS WITH APPLICATIONS
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- Intrusion detection taxonomy and data preprocessing mechanisms
- (2018) Khaled A. Al-Utaibi et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- A survey on network data collection
- (2018) Donghao Zhou et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Protein subnuclear localization based on a new effective representation and intelligent kernel linear discriminant analysis by dichotomous greedy genetic algorithm
- (2018) Shunfang Wang et al. PLoS One
- A comprehensive survey on network anomaly detection
- (2018) Gilberto Fernandes et al. TELECOMMUNICATION SYSTEMS
- A Systematic Study of Online Class Imbalance Learning With Concept Drift
- (2018) Shuo Wang et al. IEEE Transactions on Neural Networks and Learning Systems
- A holistic review of Network Anomaly Detection Systems: A comprehensive survey
- (2018) Nour Moustafa et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
- (2017) Wathiq Laftah Al-Yaseen et al. EXPERT SYSTEMS WITH APPLICATIONS
- Fuzziness based semi-supervised learning approach for intrusion detection system
- (2017) Rana Aamir Raza Ashfaq et al. INFORMATION SCIENCES
- An effective intrusion detection framework based on SVM with feature augmentation
- (2017) Huiwen Wang et al. KNOWLEDGE-BASED SYSTEMS
- Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
- (2016) Mohammed A. Ambusaidi et al. IEEE TRANSACTIONS ON COMPUTERS
- A Neural Network Ensemble Classifier for Effective Intrusion Detection Using Fuzzy Clustering and Radial Basis Function Networks
- (2016) Mohammad Amini et al. International Journal on Artificial Intelligence Tools
- A multi-level intrusion detection method for abnormal network behaviors
- (2016) Soo-Yeon Ji et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of network anomaly detection techniques
- (2016) Mohiuddin Ahmed et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Feature Augmentation via Nonparametrics and Selection (FANS) in High-Dimensional Classification
- (2016) Jianqing Fan et al. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION
- An effective combining classifier approach using tree algorithms for network intrusion detection
- (2016) Jasmin Kevric et al. NEURAL COMPUTING & APPLICATIONS
- A two-level hybrid approach for intrusion detection
- (2016) Chun Guo et al. NEUROCOMPUTING
- An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization
- (2016) Seyed Mojtaba Hosseini Bamakan et al. NEUROCOMPUTING
- An intrusion detection system using network traffic profiling and online sequential extreme learning machine
- (2015) Raman Singh et al. EXPERT SYSTEMS WITH APPLICATIONS
- A hybrid method consisting of GA and SVM for intrusion detection system
- (2015) B. M. Aslahi-Shahri et al. NEURAL COMPUTING & APPLICATIONS
- Characterization and classification of malicious Web traffic
- (2014) Katerina Goseva-Popstojanova et al. COMPUTERS & SECURITY
- A novel intrusion detection system based on feature generation with visualization strategy
- (2014) Bin Luo et al. EXPERT SYSTEMS WITH APPLICATIONS
- A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- (2013) Gisung Kim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
- (2013) Igino Corona et al. INFORMATION SCIENCES
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection
- (2012) Dennis Ippoliti et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Anomaly intrusion detection based on PLS feature extraction and core vector machine
- (2012) Xu-sheng Gan et al. KNOWLEDGE-BASED SYSTEMS
- A new intrusion detection method based on SVM with minimum within-class scatter
- (2012) Wenjuan An et al. Security and Communication Networks
- LIBSVM
- (2012) Chih-Chung Chang et al. ACM Transactions on Intelligent Systems and Technology
- Self-adaptive and dynamic clustering for online anomaly detection
- (2011) Seungmin Lee et al. EXPERT SYSTEMS WITH APPLICATIONS
- An efficient intrusion detection system based on support vector machines and gradually feature removal method
- (2011) Yinhui Li et al. EXPERT SYSTEMS WITH APPLICATIONS
- A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
- (2010) Gina C. Tjhai et al. COMPUTERS & SECURITY
- The use of computational intelligence in intrusion detection systems: A review
- (2009) Shelly Xiaonan Wu et al. APPLIED SOFT COMPUTING
- Intrusion detection by machine learning: A review
- (2009) Chih-Fong Tsai et al. EXPERT SYSTEMS WITH APPLICATIONS
- A hybrid artificial immune system and Self Organising Map for network intrusion detection
- (2008) Simon T. Powers et al. INFORMATION SCIENCES
- Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection
- (2008) G KOU et al. INFORMATION SCIENCES
- Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
- (2008) Cheng Xiang et al. PATTERN RECOGNITION LETTERS
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now