Improved intrusion detection algorithm based on TLBO and GA algorithms
Optimization algorithms are widely used for the identification of intrusion. This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. In this paper,...
| Main Authors: | Aljanabi, Mohammad, Mohd Arfian, Ismail |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Zarka Private University
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/31378/ http://umpir.ump.edu.my/id/eprint/31378/1/Improved%20intrusion%20detection%20algorithm%20based%20on%20TLBO%20and%20GA%20algorithms.pdf |
Similar Items
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
by: Aljanabi, Mohammad, et al.
Published: (2020)
by: Aljanabi, Mohammad, et al.
Published: (2020)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019)
by: Noor Syahirah, Nordin, et al.
Published: (2019)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
A GPU accelerated parallel genetic algorithm for the traveling salesman problem
by: Binjubier, Mohammed, et al.
Published: (2024)
by: Binjubier, Mohammed, et al.
Published: (2024)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
Smart object detection using deep learning algorithm and jetson nano for blind people
by: Tan, Mei Yan, et al.
Published: (2021)
by: Tan, Mei Yan, et al.
Published: (2021)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Detection of eye movements based on EEG signals and the SAX algorithm
by: Shanmuga, P. M. M., et al.
Published: (2018)
by: Shanmuga, P. M. M., et al.
Published: (2018)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
by: Ghanem, Waheed Ali H. M., et al.
Published: (2020)
by: Ghanem, Waheed Ali H. M., et al.
Published: (2020)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
by: Arif, Hanafi, et al.
Published: (2016)
by: Arif, Hanafi, et al.
Published: (2016)
Improved cuckoo search based neural network learning algorithms for data classification
by: Abdullah, Abdullah
Published: (2014)
by: Abdullah, Abdullah
Published: (2014)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
Newton competitive genetic algorithm method for optimization the production of biochemical systems
by: Mohd Arfian, Ismail, et al.
Published: (2018)
by: Mohd Arfian, Ismail, et al.
Published: (2018)
In silico gene knockout prediction using a hybrid of Bat algorithm and minimization of metabolic adjustment
by: Man, Mei Yen, et al.
Published: (2021)
by: Man, Mei Yen, et al.
Published: (2021)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
An improved genetic bat algorithm for unconstrained global optimization problems
by: Muhammad Zubair, Rehman, et al.
Published: (2020)
by: Muhammad Zubair, Rehman, et al.
Published: (2020)
Opposition-based Whale Optimization Algorithm
by: Alamri, Hammoudeh S., et al.
Published: (2018)
by: Alamri, Hammoudeh S., et al.
Published: (2018)
A population division based multi-task optimization algorithm for solving multiple-team formation problem based on Tiki-Taka optimization algorithm
by: Ahmmed, Mohammad Badal, et al.
Published: (2022)
by: Ahmmed, Mohammad Badal, et al.
Published: (2022)
A novel algorithm : apriori-ant. The combination of apriori algorithm and ants colony optimization algorithm
by: Choo, Ai Ling
Published: (2005)
by: Choo, Ai Ling
Published: (2005)
Improved BVBUC algorithm to discover closed itemsets in long biological datasets
by: Md Zaki, Fatimah Audah, et al.
Published: (2019)
by: Md Zaki, Fatimah Audah, et al.
Published: (2019)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Reversible Watermarking Based on Sorting Prediction Algorithm
by: Khalid, Edris, et al.
Published: (2015)
by: Khalid, Edris, et al.
Published: (2015)
Similar Items
-
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
by: Aljanabi, Mohammad, et al.
Published: (2020) -
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021) -
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020) -
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)