Review on anomaly based network intrusion detection system

作者: Rafath Samrin , D Vasumathi

DOI: 10.1109/ICEECCOT.2017.8284655

关键词:

摘要: … Intrusion discovery techniques are ordered into two strategies, namely Misuse Detection or Signature based … artificial intelligence techniques in wireless sensor networks,” International …

参考文章(39)
Muhammad Syafiq Mohd Pozi, Md Nasir Sulaiman, Norwati Mustapha, Thinagaran Perumal, Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming Neural Processing Letters. ,vol. 44, pp. 279- 290 ,(2016) , 10.1007/S11063-015-9457-Y
P. Ganeshkumar, N. Pandeeswari, Adaptive Neuro-Fuzzy-Based Anomaly Detection System in Cloud International Journal of Fuzzy Systems. ,vol. 18, pp. 367- 378 ,(2016) , 10.1007/S40815-015-0080-X
N. Pandeeswari, Ganesh Kumar, Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN Mobile Networks and Applications. ,vol. 21, pp. 494- 505 ,(2016) , 10.1007/S11036-015-0644-X
Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, Mohd Zakree Ahmad Nazri, Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems. The Scientific World Journal. ,vol. 2015, pp. 294761- 294761 ,(2015) , 10.1155/2015/294761
Aneetha Avalappampatty Sivasamy, Bose Sundan, A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments The Scientific World Journal. ,vol. 2015, pp. 850153- 850153 ,(2015) , 10.1155/2015/850153
F. Lydia Catherine, Ravi Pathak, V. Vaidehi, Efficient host based intrusion detection system using Partial Decision Tree and Correlation feature selection algorithm international conference on recent trends in information technology. pp. 1- 6 ,(2014) , 10.1109/ICRTIT.2014.6996115
Feng Jiang, Yuefei Sui, Cungen Cao, An incremental decision tree algorithm based on rough sets and its application in intrusion detection Artificial Intelligence Review. ,vol. 40, pp. 517- 530 ,(2013) , 10.1007/S10462-011-9293-Z
Mahdi Mohammadi, Ahmad Akbari, Bijan Raahemi, Babak Nassersharif, Hassan Asgharian, A fast anomaly detection system using probabilistic artificial immune algorithm capable of learning new attacks Evolutionary Intelligence. ,vol. 6, pp. 135- 156 ,(2014) , 10.1007/S12065-013-0101-3
Reda M. Elbasiony, Elsayed A. Sallam, Tarek E. Eltobely, Mahmoud M. Fahmy, A hybrid network intrusion detection framework based on random forests and weighted k-means Ain Shams Engineering Journal. ,vol. 4, pp. 753- 762 ,(2013) , 10.1016/J.ASEJ.2013.01.003