Global and local clustering soft assignment for intrusion detection system: a comparative study
Intrusion Detection System (IDS) plays an important role in computer network defence mechanism against malicious objects. The ability of IDS to detect new sophisticated attacks compared to traditional method such as firewall is important to secure the network. Machine Learning algorithm such as unsu...
| Main Authors: | Mohd Rizal Kadis, Azizi Abdullah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit Universiti Kebangsaan Malaysia
2017
|
| Online Access: | http://journalarticle.ukm.my/11843/ http://journalarticle.ukm.my/11843/1/16798-54961-1-PB.pdf |
Similar Items
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
by: Ahmad Zainaddin, Dahlia Asyiqin, et al.
Published: (2013)
by: Ahmad Zainaddin, Dahlia Asyiqin, et al.
Published: (2013)
Unsupervised manifold alignment using soft-assign technique
by: Fan, K., et al.
Published: (2016)
by: Fan, K., et al.
Published: (2016)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
A comparative study of different fuzzy classifiers for cloud intrusion detection systems' alerts
by: Alqahtani, Saeed M., et al.
Published: (2016)
by: Alqahtani, Saeed M., et al.
Published: (2016)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Network intrusion detection and alert system
by: To, Jin Yi
Published: (2024)
by: To, Jin Yi
Published: (2024)
A perspective-taking model for global assignments
by: Hyung Park, Joon, et al.
Published: (2013)
by: Hyung Park, Joon, et al.
Published: (2013)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Review on intrusion detection system based on the goal of the detection system
by: Khaleel, Mohammad Khamees, et al.
Published: (2018)
by: Khaleel, Mohammad Khamees, et al.
Published: (2018)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Hot-based intrusion detection system (HIDS)
by: Zaid Affendi, Zainol
Published: (2005)
by: Zaid Affendi, Zainol
Published: (2005)
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)
by: Chean, Vernon Lynn Chii
Published: (2021)
An intrusion detection system (IDS) for internet network
by: Safiee, Mohd. Fauzan
Published: (2007)
by: Safiee, Mohd. Fauzan
Published: (2007)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Snort-based smart and swift intrusion detection system
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Similar Items
-
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012) -
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019) -
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010) -
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006) -
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
by: Ahmad Zainaddin, Dahlia Asyiqin, et al.
Published: (2013)