作者: Selvakumar B , Muneeswaran K
DOI: 10.1016/J.COSE.2018.11.005
关键词: Data mining 、 Firefly algorithm 、 Intrusion 、 Network intrusion detection 、 Feature selection 、 Classifier (UML) 、 Dimensionality reduction 、 Intrusion detection system 、 Computer science 、 Bayesian network
摘要: … The IDS based on detection mechanism is categorized into misuse detection, anomaly detection and hybrid IDS. Misuse detection uses the predefined set of rules or signatures to …