KM-NEU: an efficient hybrid approach for intrusion detection system
Due to the widespread use of Internet and communication networks, a reliable and secure network plays a crucial role for Information Technology (IT) service providers and users. The hardness of network attacks as well as their complexities has also increased lately. The anomaly-based Intrusion Detec...
| Main Authors: | Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia, Udzir, Nur Izura |
|---|---|
| Format: | Article |
| Published: |
Academic Journals
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/34326/ |
Similar Items
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification
by: Juma, Sundus, et al.
Published: (2014)
by: Juma, Sundus, et al.
Published: (2014)
Improving intrusion detection using genetic algorithm
by: Hashemi, V. Moraveji, et al.
Published: (2013)
by: Hashemi, V. Moraveji, et al.
Published: (2013)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Enhanced intrusion detection capabilities via weighted chi-square, discretization and SVM
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
User-independent and self-optimizing intrusion detection framework for large database systems
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)
by: Yee, , Chan Gaik, et al.
Published: (2006)
Intrusion-detection system based on hybrid models: review paper
by: Badran, Mohammed Falih, et al.
Published: (2020)
by: Badran, Mohammed Falih, et al.
Published: (2020)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
by: M.H., Ali, et al.
Published: (2018)
by: M.H., Ali, et al.
Published: (2018)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Improved hybrid intelligent intrusion detection system using AI technique
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
by: Ghanem, Waheed Ali H. M., et al.
Published: (2020)
by: Ghanem, Waheed Ali H. M., et al.
Published: (2020)
Intrusion detection system with data mining approach: a review
by: Khalilian, Majdid, et al.
Published: (2011)
by: Khalilian, Majdid, et al.
Published: (2011)
From von Neumann architecture and Atanasoff’s ABC to Neuromorphic Computation and Kasabov’s NeuCube. Part II: Applications
by: Doborjeh, Maryam, et al.
Published: (2018)
by: Doborjeh, Maryam, et al.
Published: (2018)
Similar Items
-
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013) -
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013) -
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011) -
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011) -
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)