标题
A new hybrid approach for intrusion detection using machine learning methods
作者
关键词
Intrusion detection system, Machine learning algorithm, Hybrid system, Feature selection, NSL-KDD
出版物
APPLIED INTELLIGENCE
Volume -, Issue -, Pages -
出版商
Springer Nature
发表日期
2019-02-04
DOI
10.1007/s10489-018-01408-x
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A hybrid multi-layer intrusion detection system in cloud
- (2018) M. Manickam et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks
- (2018) S. Vimala et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment
- (2018) Chen Yang Cluster Computing-The Journal of Networks Software Tools and Applications
- Hybrid feature selection using component co-occurrence based feature relevance measurement
- (2018) Youwei Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
- A feature reduced intrusion detection system using ANN classifier
- (2017) Akashdeep et al. EXPERT SYSTEMS WITH APPLICATIONS
- Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
- (2017) Wathiq Laftah Al-Yaseen et al. EXPERT SYSTEMS WITH APPLICATIONS
- Fuzziness based semi-supervised learning approach for intrusion detection system
- (2017) Rana Aamir Raza Ashfaq et al. INFORMATION SCIENCES
- An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
- (2017) Haipeng Yao et al. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING
- A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions
- (2017) J. Rene Beulah et al. WIRELESS PERSONAL COMMUNICATIONS
- CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid
- (2017) Ruilong Deng et al. IEEE Transactions on Smart Grid
- A feature selection approach to find optimal feature subsets for the network intrusion detection system
- (2016) Seung-Ho Kang et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
- (2016) Opeyemi Osanaiye et al. EURASIP Journal on Wireless Communications and Networking
- Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
- (2016) Mohammed A. Ambusaidi et al. IEEE TRANSACTIONS ON COMPUTERS
- An improved method to construct basic probability assignment based on the confusion matrix for classification problem
- (2016) Xinyang Deng et al. INFORMATION SCIENCES
- A multi-level intrusion detection method for abnormal network behaviors
- (2016) Soo-Yeon Ji et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An effective combining classifier approach using tree algorithms for network intrusion detection
- (2016) Jasmin Kevric et al. NEURAL COMPUTING & APPLICATIONS
- A two-level hybrid approach for intrusion detection
- (2016) Chun Guo et al. NEUROCOMPUTING
- An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
- (2016) Mohammad Wazid et al. WIRELESS PERSONAL COMMUNICATIONS
- Evaluating Computer Intrusion Detection Systems
- (2015) Aleksandar Milenkoski et al. ACM COMPUTING SURVEYS
- Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks
- (2015) Sangeeta Bhattacharya et al. COMPUTER JOURNAL
- A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
- (2015) Adel Sabry Eesa et al. EXPERT SYSTEMS WITH APPLICATIONS
- An intrusion detection system using network traffic profiling and online sequential extreme learning machine
- (2015) Raman Singh et al. EXPERT SYSTEMS WITH APPLICATIONS
- Risk assessment in social lending via random forests
- (2015) Milad Malekipirbazari et al. EXPERT SYSTEMS WITH APPLICATIONS
- CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
- (2015) Wei-Chao Lin et al. KNOWLEDGE-BASED SYSTEMS
- A hybrid method consisting of GA and SVM for intrusion detection system
- (2015) B. M. Aslahi-Shahri et al. NEURAL COMPUTING & APPLICATIONS
- Hybrid ModifiedK-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems
- (2015) Wathiq Laftah Al-Yaseen et al. TheScientificWorldJOURNAL
- Hybrid ModifiedK-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems
- (2015) Wathiq Laftah Al-Yaseen et al. Scientific World Journal
- A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
- (2015) Lianyong Qi et al. IEEE Transactions on Cloud Computing
- A novel hybrid KPCA and SVM with GA model for intrusion detection
- (2014) Fangjun Kuang et al. APPLIED SOFT COMPUTING
- A novel intrusion detection system based on feature generation with visualization strategy
- (2014) Bin Luo et al. EXPERT SYSTEMS WITH APPLICATIONS
- Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps
- (2014) Emiro de la Hoz et al. KNOWLEDGE-BASED SYSTEMS
- A survey on feature selection methods
- (2013) Girish Chandrashekar et al. COMPUTERS & ELECTRICAL ENGINEERING
- Hybrid decision tree and naïve Bayes classifiers for multi-class classification tasks
- (2013) Dewan Md. Farid et al. EXPERT SYSTEMS WITH APPLICATIONS
- A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- (2013) Gisung Kim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Mining network data for intrusion detection through combining SVMs with ant colony networks
- (2013) Wenying Feng et al. Future Generation Computer Systems-The International Journal of eScience
- An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
- (2012) Shih-Wei Lin et al. APPLIED SOFT COMPUTING
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Alert correlation in collaborative intelligent intrusion detection systems—A survey
- (2011) Huwaida Tagelsir Elshoush et al. APPLIED SOFT COMPUTING
- Practical real-time intrusion detection using machine learning approaches
- (2011) Phurivit Sangkatsanee et al. COMPUTER COMMUNICATIONS
- An efficient intrusion detection system based on support vector machines and gradually feature removal method
- (2011) Yinhui Li et al. EXPERT SYSTEMS WITH APPLICATIONS
- FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems
- (2011) Khalid Alsubhi et al. International Journal of Network Management
- An assessment of the effectiveness of a random forest classifier for land-cover classification
- (2011) V.F. Rodriguez-Galiano et al. ISPRS JOURNAL OF PHOTOGRAMMETRY AND REMOTE SENSING
- Mutual information-based feature selection for intrusion detection systems
- (2011) Fatemeh Amiri et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
- (2010) Gang Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
- A novel intrusion detection system based on hierarchical clustering and support vector machines
- (2010) Shi-Jinn Horng et al. EXPERT SYSTEMS WITH APPLICATIONS
- A comparative assessment of ensemble learning for credit scoring
- (2010) Gang Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
- Intrusion detection using reduced-size RNN based on feature grouping
- (2010) Mansour Sheikhan et al. NEURAL COMPUTING & APPLICATIONS
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation
- (2009) J.D. Rodriguez et al. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search