[go: up one dir, main page]

Saxena et al., 2014 - Google Patents

Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain

Saxena et al., 2014

View PDF
Document ID
9650611112106900939
Author
Saxena H
Richariya V
Publication year
Publication venue
International Journal of Computer Applications

External Links

Snippet

Intrusion detection is a process of identifying the Attacks in the networks. The main aim of IDS is to identify the Normal and Intrusive activities. In recent years, many researchers are using data mining techniques for building IDS. Due to the nonlinearity and quantitative or …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00711Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity

Similar Documents

Publication Publication Date Title
Saxena et al. Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain
Kumar et al. Research trends in network-based intrusion detection systems: A review
Jyothsna et al. Anomaly-Based Intrusion
Devi et al. A Review Paper on IDS in Edge Computing or EoT
Pranto et al. Performance of machine learning techniques in anomaly detection with basic feature selection strategy-a network intrusion detection system
Ali et al. A review of current machine learning approaches for anomaly detection in network traffic
Hasan et al. Support vector machine and random forest modeling for intrusion detection system (IDS)
Parsaei et al. A hybrid data mining approach for intrusion detection on imbalanced NSL-KDD dataset
Panda et al. Network intrusion detection using naive bayes
Sharma et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification
Rekha et al. Intrusion detection in cyber security: role of machine learning and data mining in cyber security
Farahani Feature Selection Based on Cross‐Correlation for the Intrusion Detection System
Rahman et al. Attacks classification in adaptive intrusion detection using decision tree
Pattawaro et al. Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique
Garg et al. HyClass: Hybrid classification model for anomaly detection in cloud environment
Ghosh et al. An efficient hybrid multilevel intrusion detection system in cloud environment
Silva et al. Attackers are not stealthy: Statistical analysis of the well-known and infamous kdd network security dataset
Khaleefah et al. Detection of iot botnet cyber attacks using machine learning
Riad et al. Visualize network anomaly detection by using k-means clustering algorithm
Alsulami et al. A review on machine learning based approaches of network intrusion detection systems
Jayasimhan et al. Anomaly detection using a clustering technique
Derhab et al. Multivariate correlation analysis and geometric linear similarity for real‐time intrusion detection systems
Jackins et al. An anomaly-based network intrusion detection system using ensemble clustering
Ahirwar et al. Anomaly detection by Naive Bayes & RBF network
Abinesh et al. Deep graph convolution neural network based intrusion detection system towards early detection of malicious attacks