Finding granular features using rough-PSO in IDS
Most of the existing IDS use all the features in network traffic to evaluate and look for known intrusive pallerns. Unfortunately, such system suffers a lengthy detection procedure. Serious implication may incur to a host computer or network due to delay in diagnosis. Feature reduction improves the...
| Main Authors: | Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/10107/ http://eprints.utm.my/10107/1/AnazidaZainal2007_FindingGranularFeaturesUsingRoughPSOinIDS.pdf |
Similar Items
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Topologi kejiranan gabungan rangkaian kohonen dan particle swarm optimization (pso)
by: Forkan, Fadni, et al.
Published: (2006)
by: Forkan, Fadni, et al.
Published: (2006)
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Particle swarm optimization (PSO)-based clustering algorithm for handwritten digits recognition
by: Sahel Ba-Karait, Nasser Omer
Published: (2007)
by: Sahel Ba-Karait, Nasser Omer
Published: (2007)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
by: Nur Farahaina, Idris, et al.
Published: (2020)
by: Nur Farahaina, Idris, et al.
Published: (2020)
PSO approach for a controller based-on backstepping method in stabilizing an underactuated X4-AUV
by: Nurfadzillah, Harun, et al.
Published: (2017)
by: Nurfadzillah, Harun, et al.
Published: (2017)
Improved GbLN-PSO Algorithm for indoor localization in wireless sensor network
by: M. Shahkhir, Mozamir, et al.
Published: (2021)
by: M. Shahkhir, Mozamir, et al.
Published: (2021)
GbLN-PSO Algorithm for indoor localization in wireless sensor network
by: M. Shahkhir, Mozamir, et al.
Published: (2020)
by: M. Shahkhir, Mozamir, et al.
Published: (2020)
A Cluster-Based Distributed Hierarchical IDS for MANETs
by: B., Pahlevanzadesh, et al.
Published: (2008)
by: B., Pahlevanzadesh, et al.
Published: (2008)
Forecasting time series data using hybrid grey relational artificial neural network and auto regressive integrated moving average model
by: Salleh, Roselina, et al.
Published: (2007)
by: Salleh, Roselina, et al.
Published: (2007)
Rough sets for predicting the Kuala Lumpur Stock Exchange Composite Index returns
by: Kok, Yit-Pong, et al.
Published: (2004)
by: Kok, Yit-Pong, et al.
Published: (2004)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
by: Nur Farahaina, Idris, et al.
Published: (2021)
by: Nur Farahaina, Idris, et al.
Published: (2021)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
OctaSOM - An octagonal based SOM lattice structure for biomedical problems
by: Hasan, Shafaatunnur, et al.
Published: (2015)
by: Hasan, Shafaatunnur, et al.
Published: (2015)
Fuzzy rules reduction using rough set approach
by: Yusof, Norazah, et al.
Published: (2003)
by: Yusof, Norazah, et al.
Published: (2003)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Similar Items
-
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006) -
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007) -
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005) -
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007) -
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)