A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques

作者: Khushboo Satpute , Shikha Agrawal , Jitendra Agrawal , Sanjeev Sharma

DOI: 10.1007/978-3-642-35314-7_50

关键词:

摘要: … Intrusion Detection is the process of monitoring the events … Evolutionary algorithm has strong ability of global … space where an optimal separating hyper plane can be found, which …

参考文章(22)
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection Lecture Notes in Computer Science. pp. 512- 524 ,(2007) , 10.1007/978-3-540-74472-6_42
L Y Chuang, C J Tu, J Y Chang, FEATURE SELECTION USING PSO-SVM source:IAENG International Journal of Computer Science. ,vol. 33, pp. 111- 111 ,(2007)
Xing-Yu Wang, Hong-mei Zhang, Hai-Hua Gao, Quantum Particle swarm optimization based network Intrusion feature selection and Detection IFAC Proceedings Volumes. ,vol. 41, pp. 12312- 12317 ,(2008) , 10.3182/20080706-5-KR-1001.02084
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Feature Selection Using Rough Set in Intrusion Detection ieee region 10 conference. pp. 1- 4 ,(2006) , 10.1109/TENCON.2006.344210
WenJie Tian, JiCheng Liu, Network intrusion detection analysis with neural network and particle swarm optimization algorithm chinese control and decision conference. pp. 1749- 1752 ,(2010) , 10.1109/CCDC.2010.5498492
Yuehui Chen, Lei Zhang, Ajith Abraham, None, Evolutionary flexible neural networks for intrusion detection system ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science. pp. 428- 433 ,(2006)
Zhifeng Chen, Peide Qian, Application of PSO-RBF Neural Network in Network Intrusion Detection intelligent information technology application. ,vol. 1, pp. 362- 364 ,(2009) , 10.1109/IITA.2009.154
Tai-hang Li, Jun Wang, Rong-rong Ren, Xu Hong, A Real-time Intrusion Detection System Based on PSO-SVM ,(2009)
Li-li Liu, Yuan Liu, MQPSO Based on Wavelet Neural Network for Network Anomaly Detection 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing. pp. 4643- 4647 ,(2009) , 10.1109/WICOM.2009.5302833