E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. The massive volume of data with various dimensions and security features, on the other hand, can influence...
| Main Authors: | Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik |
|---|---|
| Format: | Article |
| Published: |
Saba Publishing
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/101031/ |
Similar Items
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
by: Syurahbil, A
Published: (2011)
by: Syurahbil, A
Published: (2011)
The intersection of targeted advertising and security: unraveling the mystery of overheard conversations
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An extended ID3 decision tree algorithm for spatial data
by: Sitanggang, Imas Sukaesih, et al.
Published: (2011)
by: Sitanggang, Imas Sukaesih, et al.
Published: (2011)
An intrusion detection system (IDS) for internet network
by: Safiee, Mohd. Fauzan
Published: (2007)
by: Safiee, Mohd. Fauzan
Published: (2007)
Intrusion detection system (IDS) using machine learning
by: Tan, May May
Published: (2024)
by: Tan, May May
Published: (2024)
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024)
by: Abdullah, Azizol, et al.
Published: (2024)
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Features selection for ids in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
by: Slamet, ., et al.
Published: (2022)
by: Slamet, ., et al.
Published: (2022)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
A signature based intrusion detection system (IDS) : using snort / Nik Mariza Nik Abdul Malik
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
Arabic ID-DGBL :an instructional design (ID)
model for e-arabic teaching and learning
by: Sahrir, Muhammad Sabri, et al.
Published: (2012)
by: Sahrir, Muhammad Sabri, et al.
Published: (2012)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Improving intrusion detection using genetic algorithm
by: Hashemi, V. Moraveji, et al.
Published: (2013)
by: Hashemi, V. Moraveji, et al.
Published: (2013)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique
by: I. , Ahmad, et al.
Published: (2010)
by: I. , Ahmad, et al.
Published: (2010)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
by: Slamet, Slamet, et al.
Published: (2022)
by: Slamet, Slamet, et al.
Published: (2022)
An intrusion detection system for the internet of things based on machine learning: review and challenges
by: Adnan, Ahmed, et al.
Published: (2021)
by: Adnan, Ahmed, et al.
Published: (2021)
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)
by: Yee, , Chan Gaik, et al.
Published: (2006)
Improved hybrid intelligent intrusion detection system using AI technique
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
by: Dahlan, Dahliyusmanto
Published: (2004)
by: Dahlan, Dahliyusmanto
Published: (2004)
Dog voice identification (ID) for detection system
by: Yeo, Che Yong, et al.
Published: (2012)
by: Yeo, Che Yong, et al.
Published: (2012)
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
by: Ibrahim, Hamidah, et al.
Published: (2014)
by: Ibrahim, Hamidah, et al.
Published: (2014)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Similar Items
-
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023) -
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023) -
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
by: Syurahbil, A
Published: (2011)