Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. This condition is attributed to the increasing number of audit data features and the decreasing performance of human-based smart intrusion detection systems regarding classifi...
| Main Authors: | Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Hindawi
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/30640/ http://umpir.ump.edu.my/id/eprint/30640/1/Improved%20TLBO-JAYA%20Algorithm.pdf |
Similar Items
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm
by: Mohd Arfian, Ismail, et al.
Published: (2017)
by: Mohd Arfian, Ismail, et al.
Published: (2017)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Hyperdize Jaya Algorithm for Harmony Search Algorithm's Parameters Selection
by: Alaa A., Al-Omoush, et al.
Published: (2016)
by: Alaa A., Al-Omoush, et al.
Published: (2016)
Embedded feature importance with threshold-based selection for optimal feature subset in autism screening
by: Ainie Hayati, Noruzman, et al.
Published: (2026)
by: Ainie Hayati, Noruzman, et al.
Published: (2026)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Correlation-based subset evaluation of feature selection for dynamic Malaysian sign language
by: Sutarman, .
Published: (2016)
by: Sutarman, .
Published: (2016)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Time series forecasting based on wavelet decomposition and correlation feature subset selection
by: Ahmed, Ehab Ali, et al.
Published: (2018)
by: Ahmed, Ehab Ali, et al.
Published: (2018)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
A Review on the Recent Application of Jaya Optimization Algorithm
by: Alsajri, Mohammad, et al.
Published: (2019)
by: Alsajri, Mohammad, et al.
Published: (2019)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019)
by: Noor Syahirah, Nordin, et al.
Published: (2019)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Algorithms of Classification of Mass Problems of Production Subject Domains
by: Malakhov, Eugene, et al.
Published: (2019)
by: Malakhov, Eugene, et al.
Published: (2019)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
by: Mohammad Khamees Khaleel, Alsajri
Published: (2022)
by: Mohammad Khamees Khaleel, Alsajri
Published: (2022)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Ontology Based Development of Domain Specific Languages for Systems Engineering
by: Mezhuyev, Vitaliy
Published: (2014)
by: Mezhuyev, Vitaliy
Published: (2014)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Selective mode excitation techniques for mode-division multiplexing: A critical review
by: Fazea, Yousef, et al.
Published: (2018)
by: Fazea, Yousef, et al.
Published: (2018)
GA-based feature subset selection in a spam/non-spam detection system
by: Behjat, Amir Rajabi, et al.
Published: (2012)
by: Behjat, Amir Rajabi, et al.
Published: (2012)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
An improved parallelized mRMR for gene subset selection in cancer classification
by: Kusairi, R.M., et al.
Published: (2017)
by: Kusairi, R.M., et al.
Published: (2017)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Gene subset selection for lung cancer classification using a multi-objective strategy
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
by: Dahlan, Dahliyusmanto
Published: (2004)
by: Dahlan, Dahliyusmanto
Published: (2004)
Methodology of Domain Specific Mathematical Modelling
by: Mezhuyev, Vitaliy
Published: (2014)
by: Mezhuyev, Vitaliy
Published: (2014)
Development of Metamodels as Logical and Algebraic Systems
by: Mezhuyev, Vitaliy
Published: (2014)
by: Mezhuyev, Vitaliy
Published: (2014)
An adaptive opposition-based learning selection: The case for jaya algorithm
by: Nasser, Abdullah B., et al.
Published: (2021)
by: Nasser, Abdullah B., et al.
Published: (2021)
Parameter estimation of cocomo model using the jaya algorithm for software cost estimation
by: Tan, Jie Chee
Published: (2019)
by: Tan, Jie Chee
Published: (2019)
Parallel Decentralized Damage Detection of a Structure with Subsets of Parameters
by: Law, S., et al.
Published: (2014)
by: Law, S., et al.
Published: (2014)
Newton competitive genetic algorithm method for optimization the production of biochemical systems
by: Mohd Arfian, Ismail, et al.
Published: (2018)
by: Mohd Arfian, Ismail, et al.
Published: (2018)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Similar Items
-
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021) -
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021) -
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm
by: Mohd Arfian, Ismail, et al.
Published: (2017) -
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006) -
Hyperdize Jaya Algorithm for Harmony Search Algorithm's Parameters Selection
by: Alaa A., Al-Omoush, et al.
Published: (2016)