Saxena et al., 2014 - Google Patents
Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gainSaxena et al., 2014
View PDF- Document ID
- 9650611112106900939
- Author
- Saxena H
- Richariya V
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
Intrusion detection is a process of identifying the Attacks in the networks. The main aim of IDS is to identify the Normal and Intrusive activities. In recent years, many researchers are using data mining techniques for building IDS. Due to the nonlinearity and quantitative or …
- 238000001514 detection method 0 title abstract description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00711—Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Saxena et al. | Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain | |
| Kumar et al. | Research trends in network-based intrusion detection systems: A review | |
| Jyothsna et al. | Anomaly-Based Intrusion | |
| Devi et al. | A Review Paper on IDS in Edge Computing or EoT | |
| Pranto et al. | Performance of machine learning techniques in anomaly detection with basic feature selection strategy-a network intrusion detection system | |
| Ali et al. | A review of current machine learning approaches for anomaly detection in network traffic | |
| Hasan et al. | Support vector machine and random forest modeling for intrusion detection system (IDS) | |
| Parsaei et al. | A hybrid data mining approach for intrusion detection on imbalanced NSL-KDD dataset | |
| Panda et al. | Network intrusion detection using naive bayes | |
| Sharma et al. | An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification | |
| Rekha et al. | Intrusion detection in cyber security: role of machine learning and data mining in cyber security | |
| Farahani | Feature Selection Based on Cross‐Correlation for the Intrusion Detection System | |
| Rahman et al. | Attacks classification in adaptive intrusion detection using decision tree | |
| Pattawaro et al. | Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique | |
| Garg et al. | HyClass: Hybrid classification model for anomaly detection in cloud environment | |
| Ghosh et al. | An efficient hybrid multilevel intrusion detection system in cloud environment | |
| Silva et al. | Attackers are not stealthy: Statistical analysis of the well-known and infamous kdd network security dataset | |
| Khaleefah et al. | Detection of iot botnet cyber attacks using machine learning | |
| Riad et al. | Visualize network anomaly detection by using k-means clustering algorithm | |
| Alsulami et al. | A review on machine learning based approaches of network intrusion detection systems | |
| Jayasimhan et al. | Anomaly detection using a clustering technique | |
| Derhab et al. | Multivariate correlation analysis and geometric linear similarity for real‐time intrusion detection systems | |
| Jackins et al. | An anomaly-based network intrusion detection system using ensemble clustering | |
| Ahirwar et al. | Anomaly detection by Naive Bayes & RBF network | |
| Abinesh et al. | Deep graph convolution neural network based intrusion detection system towards early detection of malicious attacks |