Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming
Commonly addressed problem in intrusion detection system (IDS) research works that employed NSL-KDD dataset is to improve the rare attacks detection rate. However, some of the rare attacks are hard to be recognized by the IDS model due to their patterns are totally missing from the training set, hen...
| Main Authors: | Mohd Pozi, Muhammad Syafiq, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer Verlag
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/54525/ http://psasir.upm.edu.my/id/eprint/54525/1/Improving%20anomalous%20rare%20attack%20detection%20rate%20for%20intrusion%20detection%20system%20using%20support%20vector%20machine%20and%20genetic%20programming.pdf |
Similar Items
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
Prediction of Neural Tube Defect Using Support Vector Machine
by: Wang, J., et al.
Published: (2010)
by: Wang, J., et al.
Published: (2010)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014)
by: Chan, King-Sun, et al.
Published: (2014)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Synthesis Optimization and Extraction of Rare Earth Metal Ions by Poly (N - Methylhydroxamic Acid) Resin
by: Balci, Seckin
Published: (1998)
by: Balci, Seckin
Published: (1998)
A comparative study of different fuzzy classifiers for cloud intrusion detection systems' alerts
by: Alqahtani, Saeed M., et al.
Published: (2016)
by: Alqahtani, Saeed M., et al.
Published: (2016)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Iterative group-based and difference ranking method for online rating systems with spamming attacks
by: Fu, Quan-Yun, et al.
Published: (2021)
by: Fu, Quan-Yun, et al.
Published: (2021)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Dispelling myths about rare disease registry system development
by: Bellgard, M., et al.
Published: (2013)
by: Bellgard, M., et al.
Published: (2013)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Incidence and impact of dog attacks on guide dogs in the UK: an update
by: Moxon, Rachel, et al.
Published: (2016)
by: Moxon, Rachel, et al.
Published: (2016)
Interaction in metal rare gas complexes and assignment of REMPI spectra of some disubstituted benzenes
by: Zheng, Yu
Published: (2018)
by: Zheng, Yu
Published: (2018)
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
by: Mohd Pozi, Muhammad Syafiq
Published: (2016)
by: Mohd Pozi, Muhammad Syafiq
Published: (2016)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Improving machine vision crack die detection with multi-kernel learning SVM
by: Abdullah, Mohd Khairi John
Published: (2024)
by: Abdullah, Mohd Khairi John
Published: (2024)
A modular approach to disease registry design: Successful adoption of an internet-based rare disease registry
by: Bellgard, M., et al.
Published: (2012)
by: Bellgard, M., et al.
Published: (2012)
Work stress, smoking status and smoking intensity: an observational study of 46 190 employees
by: Kouvonen, Anne, et al.
Published: (2005)
by: Kouvonen, Anne, et al.
Published: (2005)
Glycaemic and sensory impacts of using rare sugars in reformulated sucrose-containing foods
by: Smith, Alison
Published: (2024)
by: Smith, Alison
Published: (2024)
Fractal cracking patterns in concretes exposed to sulfate attack
by: Yao, J., et al.
Published: (2019)
by: Yao, J., et al.
Published: (2019)
Siren songs: a novel sonification method for network
traffic and intrusion detection
by: Skarth-Hayley, Luke
Published: (2017)
by: Skarth-Hayley, Luke
Published: (2017)
Interactions of C+(2PJ) with rare gas atoms: incipient chemical interactions, potentials and transport coefficients
by: Tuttle, William D., et al.
Published: (2018)
by: Tuttle, William D., et al.
Published: (2018)
The epidemiology and natural history of ANCA-associated vasculitis in the UK: a response to The UK Strategy for Rare Diseases
by: Pearce, Fiona A.
Published: (2018)
by: Pearce, Fiona A.
Published: (2018)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Remote assessment of platelet function in patients with acute stroke or transient ischaemic attack
by: Bath, Philip M.W., et al.
Published: (2017)
by: Bath, Philip M.W., et al.
Published: (2017)
Effort-reward imbalance and burnout among humanitarian aid workers
by: Jachens, Liza, et al.
Published: (2018)
by: Jachens, Liza, et al.
Published: (2018)
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024)
by: Leow, Yu Hong
Published: (2024)
Robust hydrophobic surfaces from suspension HVOF thermal sprayed rare-earth oxide ceramics coatings
by: Bai, Mingwen, et al.
Published: (2018)
by: Bai, Mingwen, et al.
Published: (2018)
Characterization of major elements, heavy metals, and rare earth elements in soils of MARDI station at Cameron Highlands, Malaysia using neutron activation analysis
by: Ashraf, Ahmadreza
Published: (2011)
by: Ashraf, Ahmadreza
Published: (2011)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A new classification model for a class imbalanced data set using genetic programming and support vector machines: case study for wilt disease classification
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2015)
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2015)
Anomalous event detection for pinger data
by: Batumalai, Kayathiri, et al.
Published: (2015)
by: Batumalai, Kayathiri, et al.
Published: (2015)
Effort-reward imbalance at work and the co-occurrence of lifestyle risk factors: cross-sectional survey in a sample of 36,127 public sector employees
by: Kouvonen, Anne, et al.
Published: (2006)
by: Kouvonen, Anne, et al.
Published: (2006)
A simplified space-vector modulation algorithm for four-leg NPC converters
by: Rojas, Felix, et al.
Published: (2016)
by: Rojas, Felix, et al.
Published: (2016)
Similar Items
-
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017) -
Prediction of Neural Tube Defect Using Support Vector Machine
by: Wang, J., et al.
Published: (2010) -
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003) -
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)