Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Intrusion detection has received a lot of attention from many researchers, and various techniques have been used to identify intrusions or attacks against computers and networks. Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. However, nume...
| Main Authors: | Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UKM
2011
|
| Online Access: | http://journalarticle.ukm.my/6244/ http://journalarticle.ukm.my/6244/1/1295-2497-1-SM.pdf |
Similar Items
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Signature-Based & Anomaly-Based Network & Intrusion Detection System (SBNIDS & ABNIDS)
by: Rene, Chiadighikaobi Ikenna, et al.
Published: (2015)
by: Rene, Chiadighikaobi Ikenna, et al.
Published: (2015)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Mutual Non-Disclosure Agreement between Universiti Malaysia Sarawak and SNC Associates Sdn Bhd
by: Universiti Malaysia Sarawak
Published: (2009)
by: Universiti Malaysia Sarawak
Published: (2009)
An overview of neural networks use in anomaly intrusion detection systems
by: Sani, Yusuf, et al.
Published: (2009)
by: Sani, Yusuf, et al.
Published: (2009)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
A web-based implementation of k-means algorithms
by: Lee, Quan
Published: (2022)
by: Lee, Quan
Published: (2022)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Scaling behavior of global mean sea surface temperature anomalies
by: Luo, M., et al.
Published: (2012)
by: Luo, M., et al.
Published: (2012)
Analysis of K-Mean and X-Mean Clustering Algorithms Using
Ontology-Based Dataset Filtering
by: Rahmah, Mokhtar, et al.
Published: (2021)
by: Rahmah, Mokhtar, et al.
Published: (2021)
The performance of k-means clustering method based on robust principal components
by: Kadom, Ahmed, et al.
Published: (2018)
by: Kadom, Ahmed, et al.
Published: (2018)
Anomaly detection for vision-based inspection
by: Chew, Yan Zhe
Published: (2022)
by: Chew, Yan Zhe
Published: (2022)
Ellipsoidal area mean gravity anomalies - precise computation of gravity anomaly reference fields for remove-compute-restore geoid determination
by: Hirt, Christian, et al.
Published: (2011)
by: Hirt, Christian, et al.
Published: (2011)
Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification
by: Juma, Sundus, et al.
Published: (2014)
by: Juma, Sundus, et al.
Published: (2014)
Intrusion-detection system based on hybrid models: review paper
by: Badran, Mohammed Falih, et al.
Published: (2020)
by: Badran, Mohammed Falih, et al.
Published: (2020)
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Multi-label classification using label combination to recognize human activity based on various sensor positions
by: Zainudin, Muhammad Noorazlan Shah, et al.
Published: (2017)
by: Zainudin, Muhammad Noorazlan Shah, et al.
Published: (2017)
Evaluation on thermochemical processes for bioenergy applications of Bambara groundnut shell (BGS), Shea Nut Shell (SNS), Shea Nut chaff (SNC), and Sweet Sorghum Stalk (SSS)
by: Ibrahim, Mustapha Danladi
Published: (2025)
by: Ibrahim, Mustapha Danladi
Published: (2025)
Testing the accruals anomaly based on the speed of price adjustment
by: Choy, Siu Kai, et al.
Published: (2021)
by: Choy, Siu Kai, et al.
Published: (2021)
Hot-based intrusion detection system (HIDS)
by: Zaid Affendi, Zainol
Published: (2005)
by: Zaid Affendi, Zainol
Published: (2005)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Similar Items
-
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013) -
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005) -
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006) -
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011) -
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)