Network intrusions classification using data mining approaches
Intrusion Detection System has an important task in detecting threats or attacks in the computer networks. Intrusion Detection System (IDS) is a network protection device used to identify and check data packets in network traffic. Snort is free software used to detect attacks and protect computer ne...
| Main Authors: | Slamet, Slamet, Izzeldin, Ibrahim Mohamed |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JATIT
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/37961/ http://umpir.ump.edu.my/id/eprint/37961/1/Network%20intrusions%20classification%20using%20data%20mining%20approaches.pdf |
Similar Items
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
by: Slamet, Slamet, et al.
Published: (2022)
by: Slamet, Slamet, et al.
Published: (2022)
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
by: Slamet, ., et al.
Published: (2022)
by: Slamet, ., et al.
Published: (2022)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Data mining in electronic commerce using classification technique / Lim Lee Chin
by: Lim , Lee Chin
Published: (2003)
by: Lim , Lee Chin
Published: (2003)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Classification with degree of importance of attributes for stock market data mining
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Data mining approach to herbs classification
by: Ahmad Dali, Adillah Dayana, et al.
Published: (2018)
by: Ahmad Dali, Adillah Dayana, et al.
Published: (2018)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Data Mining for Building Neural Protein Sequence Classification Systems with Improved Performance
by: Wang, Dianhui, et al.
Published: (2003)
by: Wang, Dianhui, et al.
Published: (2003)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Discovering interesting knowledge in databases – Data Mining with classification / Kheong Ling Ling
by: Kheong , Ling Ling
Published: (2003)
by: Kheong , Ling Ling
Published: (2003)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Trademark image classification approaches using neural network and rough set theory
by: Saad, Puteh
Published: (2003)
by: Saad, Puteh
Published: (2003)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique
by: I. , Ahmad, et al.
Published: (2010)
by: I. , Ahmad, et al.
Published: (2010)
Stock Market Prediction with Big Data Through Hybridization of Data Mining and Optimized Neural Network Techniques
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
by: Slamet, ., et al.
Published: (2020)
by: Slamet, ., et al.
Published: (2020)
Immune Multi Agent System for Intrusion Prevention and Self healing System Implement a Non-Linear Classification
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Trends in IoT intrusion detection: A bibliometric analysis of deep learning approaches
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
Accelerated mine blast algorithm for ANFIS training for solving classification problems
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques
by: Kayalvily, Tabianan, et al.
Published: (2022)
by: Kayalvily, Tabianan, et al.
Published: (2022)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Selecting informative genes from leukemia gene expression data using a hybrid approach for cancer classification
by: Mohamad, Mohd. Saberi, et al.
Published: (2007)
by: Mohamad, Mohd. Saberi, et al.
Published: (2007)
Data Mining Approach on Nationwide School Exam System
by: ONG Wai Kit, Janson Luke, et al.
Published: (2004)
by: ONG Wai Kit, Janson Luke, et al.
Published: (2004)
Similar Items
-
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
by: Slamet, Slamet, et al.
Published: (2022) -
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
by: Slamet, ., et al.
Published: (2022) -
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010) -
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009) -
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)