Features selection for ids in encrypted traffic using genetic algorithm
Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. On the other hand, encrypted exchanges between users are widely used to ensure data security. Traditional IDSs are not able to reactive efficiently in encrypted and tunneled traffic d...
| Main Authors: | Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
UUM College of Arts and Sciences, Universiti Utara Malaysia
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/41307/ http://psasir.upm.edu.my/id/eprint/41307/1/41307.pdf |
Similar Items
Features selection for IDS in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
An extended ID3 decision tree algorithm for spatial data
by: Sitanggang, Imas Sukaesih, et al.
Published: (2011)
by: Sitanggang, Imas Sukaesih, et al.
Published: (2011)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Multilocal feature selection using genetic algorithm for face identification
by: Mohamad, Dzulkifli
Published: (2008)
by: Mohamad, Dzulkifli
Published: (2008)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)
by: Bouke, Mohamed Aly, et al.
Published: (2022)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
Multi local feature selection using genetic algorithm for face identification
by: Chu, Kai Chuan
Published: (2007)
by: Chu, Kai Chuan
Published: (2007)
Selective video encryption algorithm based on H.264/AVC and AES
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
by: Mohd. Zin, Zalhan
Published: (2007)
by: Mohd. Zin, Zalhan
Published: (2007)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Red, gred, agred congestion control algorithms in heterogeneous traffic types
by: Seifaddini, Omid, et al.
Published: (2013)
by: Seifaddini, Omid, et al.
Published: (2013)
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
by: Mohd. Zin, Zalhan, et al.
Published: (2007)
by: Mohd. Zin, Zalhan, et al.
Published: (2007)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapiāee
Published: (2012)
by: Jamel, Sapiāee
Published: (2012)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Naive bayes-guided bat algorithm for feature selection.
by: Taha, Ahmed Majid, et al.
Published: (2013)
by: Taha, Ahmed Majid, et al.
Published: (2013)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Similar Items
-
Features selection for IDS in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013) -
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014) -
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014) -
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013) -
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)