Integrating genetic algorithms and fuzzy c-means for anomaly detection
The goal of intrusion detection is to discover unauthorized use of computer systems. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and ex...
| Main Authors: | Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/7451/ http://eprints.utm.my/7451/1/Abdullah_Abd_Hanan_2005_Integrating_Genetic_Algorithms_Fuzzy_c-Means.pdf |
Similar Items
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Independent Component Analysis And Rough Fuzzy Based
Approach To Web Usage Mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Mining Usage Web Log Via Independent Component Analysis And Rough Fuzzy
by: Siriporn, Chimphlee, et al.
Published: (2006)
by: Siriporn, Chimphlee, et al.
Published: (2006)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Rough Sets Clustering and Markov model for Web Access Prediction
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
A static jobs scheduling for independent jobs in Grid Environment by using Fuzzy C-Mean and Genetic algorithms
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Predicting next page access by Markov models and association rules on web log data
by: Chimphlee, S., et al.
Published: (2006)
by: Chimphlee, S., et al.
Published: (2006)
Using Markov Model and Association Rules for Web Access Prediction
by: Siriporn, Chimphlee, et al.
Published: (2006)
by: Siriporn, Chimphlee, et al.
Published: (2006)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
On using genetic algorithm for initialising semi-supervised fuzzy c-means clustering
by: Lai, Daphne Teck Ching, et al.
Published: (2016)
by: Lai, Daphne Teck Ching, et al.
Published: (2016)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
by: Lorpunmanee, Siriluck, et al.
Published: (2007)
by: Lorpunmanee, Siriluck, et al.
Published: (2007)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Image Segmentation With Cyclic Load Balanced Parallel
Fuzzy C - Means.
by: Vadiveloo, Mogana
Published: (2010)
by: Vadiveloo, Mogana
Published: (2010)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Enhancing an evolving tree-based text document visualization model with fuzzy c-means clustering
by: Wui, Lee Chang, et al.
Published: (2013)
by: Wui, Lee Chang, et al.
Published: (2013)
Fuzzy C mean clustering in off-line handwriting signature verfication system
by: Lee, Beng Yong
Published: (2006)
by: Lee, Beng Yong
Published: (2006)
Harmony Search-Based Cluster Initialization For Fuzzy C-Means Segmentation Of MR Images.
by: Moh’d Alia, Osama, et al.
Published: (2009)
by: Moh’d Alia, Osama, et al.
Published: (2009)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Network routing by mobile agents for image retrieval using fuzzy genetic algorithms
by: Selamat, Ali, et al.
Published: (2005)
by: Selamat, Ali, et al.
Published: (2005)
Facial image retrieval on semantic features using adaptive mean genetic algorithm
by: Shnan, Marwan Ali, et al.
Published: (2019)
by: Shnan, Marwan Ali, et al.
Published: (2019)
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
by: Zulaiha Ali Othman,, et al.
Published: (2011)
by: Zulaiha Ali Othman,, et al.
Published: (2011)
A novel solution to traveling salesman problem using fuzzy sets, gravitational search algorithm, and genetic algorithm
by: Abarghouei, Amir Atapour
Published: (2010)
by: Abarghouei, Amir Atapour
Published: (2010)
Ellipsoidal area mean gravity anomalies - precise computation of gravity anomaly reference fields for remove-compute-restore geoid determination
by: Hirt, Christian, et al.
Published: (2011)
by: Hirt, Christian, et al.
Published: (2011)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
by: Abdul Wahid, Mohammed N.
Published: (2016)
by: Abdul Wahid, Mohammed N.
Published: (2016)
A fuzzy-tuned genetic algorithm for optimal reconfigurations of radial distribution network
by: Sahoo, N. C., et al.
Published: (2007)
by: Sahoo, N. C., et al.
Published: (2007)
Similar Items
-
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005) -
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006) -
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006) -
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006) -
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006)