A study on intrusion detection using neural networks trained with evolutionary algorithms
出版年份 2015 全文链接
标题
A study on intrusion detection using neural networks trained with evolutionary algorithms
作者
关键词
Intrusion detection, Intrusion detection system, Artificial neural network, NSL-KDD
出版物
SOFT COMPUTING
Volume 21, Issue 10, Pages 2687-2700
出版商
Springer Nature
发表日期
2015-12-09
DOI
10.1007/s00500-015-1967-z
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Evolving statistical rulesets for network intrusion detection
- (2015) Samaneh Rastegari et al. APPLIED SOFT COMPUTING
- A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection
- (2014) Fangjun Kuang et al. SOFT COMPUTING
- A distributed approach to network anomaly detection based on independent component analysis
- (2013) Francesco Palmieri et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- (2013) Gisung Kim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components
- (2013) Iftikhar Ahmad et al. NEURAL COMPUTING & APPLICATIONS
- Network anomaly detection with the restricted Boltzmann machine
- (2013) Ugo Fiore et al. NEUROCOMPUTING
- Automatic network intrusion detection: Current techniques and open issues
- (2012) Carlos A. Catania et al. COMPUTERS & ELECTRICAL ENGINEERING
- EAACK—A Secure Intrusion-Detection System for MANETs
- (2012) Elhadi M. Shakshuki et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems
- (2012) J. Gómez et al. SOFT COMPUTING
- Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
- (2012) Fenye Bao et al. IEEE Transactions on Network and Service Management
- Distributed denial of service attack detection using an ensemble of neural classifier
- (2011) P. Arun Raj Kumar et al. COMPUTER COMMUNICATIONS
- Network anomaly detection through nonlinear analysis
- (2010) Francesco Palmieri et al. COMPUTERS & SECURITY
- A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
- (2010) Gang Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
- A novel intrusion detection system based on hierarchical clustering and support vector machines
- (2010) Shi-Jinn Horng et al. EXPERT SYSTEMS WITH APPLICATIONS
- An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks
- (2010) Sooyeon Shin et al. IEEE Transactions on Industrial Informatics
- An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
- (2010) Shingo Mabu et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- A hybrid intrusion detection system design for computer network security
- (2009) M. Ali Aydın et al. COMPUTERS & ELECTRICAL ENGINEERING
- A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
- (2009) Jiankun Hu et al. IEEE NETWORK
- GSA: A Gravitational Search Algorithm
- (2009) Esmat Rashedi et al. INFORMATION SCIENCES
- Internet traffic modeling by means of Hidden Markov Models
- (2008) Alberto Dainotti et al. Computer Networks
- Critical study of neural networks in detecting intrusions
- (2008) Rachid Beghdad COMPUTERS & SECURITY
- Data mining-based intrusion detectors
- (2008) Su-Yun Wu et al. EXPERT SYSTEMS WITH APPLICATIONS
- A study on the use of non-parametric tests for analyzing the evolutionary algorithms’ behaviour: a case study on the CEC’2005 Special Session on Real Parameter Optimization
- (2008) Salvador García et al. JOURNAL OF HEURISTICS
- Intrusion detection using a linguistic hedged fuzzy-XCS classifier system
- (2008) Javier G. Marín-Blázquez et al. SOFT COMPUTING
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now