Enhanced intrusion detection capabilities via weighted chi-square, discretization and SVM
Anomaly Intrusion Detection Systems (ADSs) identify patterns of network data behaviour to determine whether they are normal or represent an attack using the learning detection model. Much research has been conducted on enhancing ADSs particularly in the area of data mining that focuses on intrusive...
| Main Authors: | Mohamed Yassin, Warusia, Abdollah, Mohd Faizal, Mas'ud, Mohd Zaki, Yusof, Robiah, Abdullah, Raihana Syahirah, Muda, Zaiton |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Little Lion Scientific
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/72575/ http://psasir.upm.edu.my/id/eprint/72575/1/Enhanced%20intrusion%20detection%20capabilities%20.pdf |
Similar Items
Improving intrusion detection using genetic algorithm
by: Hashemi, V. Moraveji, et al.
Published: (2013)
by: Hashemi, V. Moraveji, et al.
Published: (2013)
Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification
by: Juma, Sundus, et al.
Published: (2014)
by: Juma, Sundus, et al.
Published: (2014)
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
KM-NEU: an efficient hybrid approach for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Visualising data distributions with kernel density estimation and reduced chi-squared statistic
by: Spencer, Christopher, et al.
Published: (2017)
by: Spencer, Christopher, et al.
Published: (2017)
Belajar Least Squares Support Vector Machines (LS-SVM) dalam masa seminggu
by: Mohd Herwan, Sulaiman, et al.
Published: (2017)
by: Mohd Herwan, Sulaiman, et al.
Published: (2017)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
A note on the asymptotic normality of the kernel deconvolution density estimator with logarithmic chi-square noise
by: Zu, Yang
Published: (2015)
by: Zu, Yang
Published: (2015)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
Jogging at CHI
by: Mueller, Florian ‘Floyd’, et al.
Published: (2016)
by: Mueller, Florian ‘Floyd’, et al.
Published: (2016)
Quantitative analysis of urban sprawl in Tripoli using Pearson's chi-square statistics and urban expansion intensity index
by: Al-sharif, Abubakr A. A., et al.
Published: (2014)
by: Al-sharif, Abubakr A. A., et al.
Published: (2014)
Available Transfer Capability and Least Square Method
by: Hojabri, Mojgan, et al.
Published: (2012)
by: Hojabri, Mojgan, et al.
Published: (2012)
Available transfer capability and least square method
by: Hojabri, Mojgan, et al.
Published: (2012)
by: Hojabri, Mojgan, et al.
Published: (2012)
An improved hybrid of SVM and SCAD for pathway analysis
by: Misman, Muhammad Faiz, et al.
Published: (2011)
by: Misman, Muhammad Faiz, et al.
Published: (2011)
Chi Kung and health
by: Chan, ES, et al.
Published: (2011)
by: Chan, ES, et al.
Published: (2011)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
The effects of concentration ratios on the particle size of CHI-ALG-CaCl2 nanocarriers
by: R. I., Jalani, et al.
Published: (2020)
by: R. I., Jalani, et al.
Published: (2020)
Enhancing Match Detection Process Using Chi-Square Equation for Improving Type-3 and Type-4 Clones in Java Applications
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
Design of robust broadband beamformers with discrete coefficients and least squared criterion
by: Dam, Hai, et al.
Published: (2013)
by: Dam, Hai, et al.
Published: (2013)
Effects of petroleum fiscal regimes and tax instruments on the investment climate of marginal oil fields in Malaysia
by: Mas'ud, Abdulsalam
Published: (2016)
by: Mas'ud, Abdulsalam
Published: (2016)
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
by: Althuwaynee, Omar F., et al.
Published: (2014)
by: Althuwaynee, Omar F., et al.
Published: (2014)
Massively-parallel and concurrent SVM architectures
by: Phear, P. B. A.
Published: (2018)
by: Phear, P. B. A.
Published: (2018)
Observation of the chi(b1)(3P) and chi(b2)(3P) and measurement of their masses
by: Sirunyan, A. M., et al.
Published: (2018)
by: Sirunyan, A. M., et al.
Published: (2018)
Feature selection for classification of hyperspectral data by SVM
by: Pal, Mahesh, et al.
Published: (2010)
by: Pal, Mahesh, et al.
Published: (2010)
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
by: Althuwaynee, Omar F., et al.
Published: (2014)
by: Althuwaynee, Omar F., et al.
Published: (2014)
Reflections on the sea in Jimmy Chi's Corrugation Road
by: Haebich, Anna
Published: (2018)
by: Haebich, Anna
Published: (2018)
Similar Items
-
Improving intrusion detection using genetic algorithm
by: Hashemi, V. Moraveji, et al.
Published: (2013) -
Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification
by: Juma, Sundus, et al.
Published: (2014) -
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2013) -
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010) -
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)