An enhancement of classification technique based on rough set theory for intrusion detection system application
An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. However, accuracy performance is one of the issues in IDS application. Meanwhile, classification is one of...
| Main Author: | Noor Suhana, Sulaiman |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/29915/ http://umpir.ump.edu.my/id/eprint/29915/1/An%20enhancement%20of%20classification%20technique%20based%20on%20rough%20set%20theoryfor%20intrusion%20detection%20system%20application.wm.pdf |
Similar Items
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Empirical analysis of rough set categorical clustering techniques based on rough purity and value set
by: Uddin, Jamal
Published: (2017)
by: Uddin, Jamal
Published: (2017)
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Behavious based computer user clustering using rough set theory
by: Wang , Le Wei
Published: (2013)
by: Wang , Le Wei
Published: (2013)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007)
by: Sulaiman, Noor Suhana
Published: (2007)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
RMF: Rough Set Membership Function-based for Clustering Web Transactions
by: Herawan, Tutut, et al.
Published: (2013)
by: Herawan, Tutut, et al.
Published: (2013)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Customer churn classification in telecommunication company using rough set theory
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)
by: Zakira, Inayat, et al.
Published: (2016)
Trademark image classification approaches using neural network and rough set theory
by: Saad, Puteh
Published: (2003)
by: Saad, Puteh
Published: (2003)
Soft set theory based decision support system for mining electronic government dataset
by: Witarsyah, Deden, et al.
Published: (2020)
by: Witarsyah, Deden, et al.
Published: (2020)
Enhancing Classification Algorithms with Metaheuristic Technique
by: Cokro, Nurwinto, et al.
Published: (2024)
by: Cokro, Nurwinto, et al.
Published: (2024)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
by: Slamet, Slamet, et al.
Published: (2022)
by: Slamet, Slamet, et al.
Published: (2022)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Detection of colon cancer based on microarray dataset using machine learning as a feature selection and classification techniques
by: A. S. M, Shafi, et al.
Published: (2020)
by: A. S. M, Shafi, et al.
Published: (2020)
Similar Items
-
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017) -
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)