To identify suspicious activity in anomaly detection based on soft computing
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false al...
| Main Authors: | Chimphlee, Witcha, Sap, M., Abdullah, Abdul Hanan, Chimphlee, Siriporn, Srinoy, Surat |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/7454/ |
Similar Items
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Rough Sets Clustering and Markov model for Web Access Prediction
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Independent Component Analysis And Rough Fuzzy Based
Approach To Web Usage Mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Mining Usage Web Log Via Independent Component Analysis And Rough Fuzzy
by: Siriporn, Chimphlee, et al.
Published: (2006)
by: Siriporn, Chimphlee, et al.
Published: (2006)
Predicting next page access by Markov models and association rules on web log data
by: Chimphlee, S., et al.
Published: (2006)
by: Chimphlee, S., et al.
Published: (2006)
Using Markov Model and Association Rules for Web Access Prediction
by: Siriporn, Chimphlee, et al.
Published: (2006)
by: Siriporn, Chimphlee, et al.
Published: (2006)
A static jobs scheduling for independent jobs in Grid Environment by using Fuzzy C-Mean and Genetic algorithms
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Suspicious activity trigger system using YOLOv6 convolutional neural network
by: Suryanti, Awang, et al.
Published: (2023)
by: Suryanti, Awang, et al.
Published: (2023)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
A study on soft computing approach in weather forecasting
by: Yen, Wee Khun
Published: (2010)
by: Yen, Wee Khun
Published: (2010)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
A Soft Computing Approach for the Memory Storage of a Sound Signal Processor
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2010)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2010)
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
Mobile malware anomaly-based detection systems using static analysis features / Ahmad Firdaus Zainal Abidin
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
A scientific review of soft-computing techniques and methods
for stock market prediction
by: Islam, Muhammad Rabiul, et al.
Published: (2018)
by: Islam, Muhammad Rabiul, et al.
Published: (2018)
Novel detection soft-computing algorithm for structural health monitoring system
by: Ng, Kian Theng
Published: (2013)
by: Ng, Kian Theng
Published: (2013)
Identification of ECG anomalies through deep deterministic learning / Uzair Iqbal
by: Uzair , Iqbal
Published: (2020)
by: Uzair , Iqbal
Published: (2020)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Suspicious loitering detection from annotated CCTV feed using CEP based approach
by: Rabiah Adawiyah Shahad,, et al.
Published: (2018)
by: Rabiah Adawiyah Shahad,, et al.
Published: (2018)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Outlier Detection Technique in Data Mining: A Research Perspective
by: Mansur, M. O., et al.
Published: (2005)
by: Mansur, M. O., et al.
Published: (2005)
Ellipsoidal area mean gravity anomalies - precise computation of gravity anomaly reference fields for remove-compute-restore geoid determination
by: Hirt, Christian, et al.
Published: (2011)
by: Hirt, Christian, et al.
Published: (2011)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
by: Lorpunmanee, Siriluck, et al.
Published: (2008)
by: Lorpunmanee, Siriluck, et al.
Published: (2008)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Hybrid Filter for Attributes Reduction in Soft Set
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
Similar Items
-
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005) -
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006) -
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005) -
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006) -
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)