A machine learning based AIS IDS.
In recent years we have seen a very great interest in combining naturally inspired techniques with existing conventional approaches. In this study we combined Negative Selection theory, one of most important theories in AIS, and knowledge production rules to propose a novel IDS. To generate the dete...
| Main Authors: | Mahboubian, Mohammad, Abdul Hamid, Nor Asila Wati |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
IACSIT Press
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30694/ http://psasir.upm.edu.my/id/eprint/30694/1/A%20machine%20learning%20based%20AIS%20IDS.pdf |
Similar Items
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
Danger theory: the link between AIS and IDS?
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
Intrusion detection system (IDS) using machine learning
by: Tan, May May
Published: (2024)
by: Tan, May May
Published: (2024)
An alert fusion model inspired by artificial immune system.
by: Mahboubian, Mohammad, et al.
Published: (2012)
by: Mahboubian, Mohammad, et al.
Published: (2012)
Arabic ID-DGBL :an instructional design (ID)
model for e-arabic teaching and learning
by: Sahrir, Muhammad Sabri, et al.
Published: (2012)
by: Sahrir, Muhammad Sabri, et al.
Published: (2012)
AI based power allocation for NOMA
by: Manglayev, Talgat, et al.
Published: (2022)
by: Manglayev, Talgat, et al.
Published: (2022)
A Cluster-Based Distributed Hierarchical IDS for MANETs
by: B., Pahlevanzadesh, et al.
Published: (2008)
by: B., Pahlevanzadesh, et al.
Published: (2008)
Exploring artificial intelligence(AI) for machine automation
by: Meow, Mervyn Zi Yang
Published: (2019)
by: Meow, Mervyn Zi Yang
Published: (2019)
Implications for ID practice of Instructional Designers' Cultural Identities
by: Campbell, Kathy, et al.
Published: (2009)
by: Campbell, Kathy, et al.
Published: (2009)
Registration for Single ID Guide
by: Mohd Hamizan, Baki
Published: (2016)
by: Mohd Hamizan, Baki
Published: (2016)
CASI Method for Improving the Usability of IDS
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
MicroRNAs and intellectual disability (ID) in Down syndrome, X-linked ID and Fragile X syndrome
by: Siew, Wei Hong, et al.
Published: (2013)
by: Siew, Wei Hong, et al.
Published: (2013)
UPM bangunkan Putra Virtual ID
by: Utusan Malaysia
Published: (2018)
by: Utusan Malaysia
Published: (2018)
Dog voice identification (ID) for detection system
by: Yeo, Che Yong, et al.
Published: (2012)
by: Yeo, Che Yong, et al.
Published: (2012)
AI techniques in the implementation of distance learning: A proposal
by: Mohd. Yasin, Noraniah, et al.
Published: (2000)
by: Mohd. Yasin, Noraniah, et al.
Published: (2000)
CatIDS: Using market-based mechanism as a tool for protection by adaptation
by: Hassan, S., et al.
Published: (2005)
by: Hassan, S., et al.
Published: (2005)
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
by: Ibrahim, Hamidah, et al.
Published: (2014)
by: Ibrahim, Hamidah, et al.
Published: (2014)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
An intrusion detection system (IDS) for internet network
by: Safiee, Mohd. Fauzan
Published: (2007)
by: Safiee, Mohd. Fauzan
Published: (2007)
Introduction to the Heijkoop approach to challenging behaviour in ID
by: Heijkoop, Jacques, et al.
Published: (2012)
by: Heijkoop, Jacques, et al.
Published: (2012)
International Doris Service (IDS): Data and Products
by: Allahvirdizadeh, Amir
Published: (2012)
by: Allahvirdizadeh, Amir
Published: (2012)
Animal voice recognition for identification (ID) detection system
by: Yeo, Che Yong, et al.
Published: (2011)
by: Yeo, Che Yong, et al.
Published: (2011)
A feedback based prediction model for real time workload in a cloud
by: Ghouchani, Babak Esmaeilpour, et al.
Published: (2016)
by: Ghouchani, Babak Esmaeilpour, et al.
Published: (2016)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
Accounting learning package / Wong Ai Yieng
by: Wong, Ai Yieng
Published: (2001)
by: Wong, Ai Yieng
Published: (2001)
Research on the mechanism of AI service satisfaction based on the culture and AI strategy perspective.
by: Du, Shi-Qi
Published: (2020)
by: Du, Shi-Qi
Published: (2020)
Research on the mechanism of AI service satisfaction based on the culture and AI strategy perspective.
by: Du, Shiqi
Published: (2020)
by: Du, Shiqi
Published: (2020)
Research on the mechanism of AI service satisfaction based on the culture and AI strategy perspective.
by: Du, Shiqi
Published: (2020)
by: Du, Shiqi
Published: (2020)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Digital student ID card using NFC technology
by: Eng, Mun Shuen
Published: (2022)
by: Eng, Mun Shuen
Published: (2022)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
by: Bhaskar, Hariyaran
Published: (2020)
by: Bhaskar, Hariyaran
Published: (2020)
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
by: Abdulkareem, Fatimah Saleem, et al.
Published: (2023)
A signature based intrusion detection system (IDS) : using snort / Nik Mariza Nik Abdul Malik
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Processing time estimation in precision machining industry using AI / Lim Say Li
by: Lim, Say Li
Published: (2017)
by: Lim, Say Li
Published: (2017)
Features selection for ids in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Revolution of ID card / Belinda Michelle Benedict...[et.al]
by: Benedict, Belinda Michelle, et al.
Published: (2016)
by: Benedict, Belinda Michelle, et al.
Published: (2016)
Similar Items
-
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005) -
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003) -
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003) -
Danger theory: the link between AIS and IDS?
by: Aickelin, Uwe, et al.
Published: (2003) -
Intrusion detection system (IDS) using machine learning
by: Tan, May May
Published: (2024)