A novel local network intrusion detection system based on support vector machine
Problem statement: Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable Intrusion Detection Systems (IDS). Many methods and techniques were used for modeling the IDS, but some of them contribute little or not to resolve it. Appr...
| Main Authors: | Mohammed, Muamer N., Norrozila, Sulaiman, Khalaf, Emad Taha |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2011
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/24822/ http://umpir.ump.edu.my/id/eprint/24822/1/A%20novel%20local%20network%20intrusion%20detection%20system%20based%20on%20support%20vector%20machine.pdf |
Similar Items
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Efficient classifying and indexing for large iris database based on enhanced clustering method
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Combined support vector machine and pattern matching for hadith question classification system
by: Ali Muttaleb, Hasan, et al.
Published: (2018)
by: Ali Muttaleb, Hasan, et al.
Published: (2018)
Fingertip detection using histogram of gradients and support vector machine
by: Sophian, Ali, et al.
Published: (2017)
by: Sophian, Ali, et al.
Published: (2017)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Short term forecasting based on hybrid least squares support vector machines
by: Zuriani, Mustaffa, et al.
Published: (2018)
by: Zuriani, Mustaffa, et al.
Published: (2018)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
A comparison of quadratic programming solvers in support vector machines training
by: Zaki, N. M., et al.
Published: (2003)
by: Zaki, N. M., et al.
Published: (2003)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
Texture classification using wavelet transform and support vector machines
by: Yeo, Alvin Zong Yun
Published: (2011)
by: Yeo, Alvin Zong Yun
Published: (2011)
Email categorization using support vector machine
by: Mohd. Daud, Mariah
Published: (2004)
by: Mohd. Daud, Mariah
Published: (2004)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV AND OLSR Routing Protocols In MANET
by: Norrozila, Sulaiman, et al.
Published: (2014)
by: Norrozila, Sulaiman, et al.
Published: (2014)
Support directional shifting vector: A direction based machine learning classifier
by: Kowsher, Md., et al.
Published: (2021)
by: Kowsher, Md., et al.
Published: (2021)
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
by: Mohammad Khamees Khaleel, Alsajri
Published: (2022)
by: Mohammad Khamees Khaleel, Alsajri
Published: (2022)
Hybrid least squares support vector machines for short term predictive analysis
by: Zuriani, Mustaffa, et al.
Published: (2017)
by: Zuriani, Mustaffa, et al.
Published: (2017)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A support vector machine classification of
computational capabilities of 3D map on mobile
device for navigation aid
by: Abubakar, Adamu, et al.
Published: (2016)
by: Abubakar, Adamu, et al.
Published: (2016)
The Identification of hunger behaviour of lates calcarifer through the integration of image processing technique and support vector machine
by: Taha, Zahari, et al.
Published: (2018)
by: Taha, Zahari, et al.
Published: (2018)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Bioactivity classification of anti aids compounds using neural network and support vector machine: a comparison
by: A. Hamid, Rahayu
Published: (2004)
by: A. Hamid, Rahayu
Published: (2004)
Improving sentiment reviews classification performance using support vector machine-fuzzy matching algorithm
by: Nurcahyawati, Vivine, et al.
Published: (2023)
by: Nurcahyawati, Vivine, et al.
Published: (2023)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
Similar Items
-
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011) -
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016) -
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013) -
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018) -
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)