Signature-based anomaly intrusion detection using integrated data mining classifiers
As the influence of Internet and networking technologies as communication medium advance and expand across the globe, cyber attacks also grow accordingly. Anomaly detection systems (ADSs) are employed to scrutinize information such as packet behaviours coming from various locations on network to fin...
| Main Authors: | Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Zulzalil, Hazura, Muda, Zaiton |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47759/ http://psasir.upm.edu.my/id/eprint/47759/1/Signature-based%20anomaly%20intrusion%20detection%20using%20integrated%20data%20mining%20classifiers.pdf |
Similar Items
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
KM-NEU: an efficient hybrid approach for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
Signature-Based & Anomaly-Based Network & Intrusion Detection System (SBNIDS & ABNIDS)
by: Rene, Chiadighikaobi Ikenna, et al.
Published: (2015)
by: Rene, Chiadighikaobi Ikenna, et al.
Published: (2015)
Improving intrusion detection using genetic algorithm
by: Hashemi, V. Moraveji, et al.
Published: (2013)
by: Hashemi, V. Moraveji, et al.
Published: (2013)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification
by: Juma, Sundus, et al.
Published: (2014)
by: Juma, Sundus, et al.
Published: (2014)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Access control in open distributed systems
by: Udzir, Nur Izura, et al.
Published: (2012)
by: Udzir, Nur Izura, et al.
Published: (2012)
Enhanced intrusion detection capabilities via weighted chi-square, discretization and SVM
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
A refined filter for UHAD to improve anomaly detection
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
An overview of neural networks use in anomaly intrusion detection systems
by: Sani, Yusuf, et al.
Published: (2009)
by: Sani, Yusuf, et al.
Published: (2009)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Refined garbage collection for open distributed systems with multicapabilities
by: Udzir, Nur Izura, et al.
Published: (2008)
by: Udzir, Nur Izura, et al.
Published: (2008)
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
by: Kakavand, Mohsen, et al.
Published: (2016)
by: Kakavand, Mohsen, et al.
Published: (2016)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
Similar Items
-
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015) -
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014) -
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013) -
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012) -
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)