Fuzzy logic based methods together with the techniques from Artificial Intelligence have gained importance. Data mining techniques like clustering techniques, Association rules together with fuzzy logic to model the fuzzy association rules are being used for classifying data. These together with the techniques of genetic algorithms like genetic programming are producing better results. The present paper proposes a model for intrusion detection systems for anomaly detection based on fuzzy association rules which use genetic programming. The model is implemented and tested on sample data with 40 variables and the results are documented in the paper. As the model includes the LGP,MEP and GEP where the three collectively tries to detect the int...
The exponential growth and development of the internet has created many problems on network security...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Anomaly detection as a kind of intrusion detection is good at detecting the unknown attacks or new a...
In this paper, we present a multi-objective genetic fuzzy system for anomaly intrusion detection. Th...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
Network security is of primary concerned now days for large organizations. Various types of Intrusio...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
As the Internet services spread all over the world, many kinds of security threats are increasing. ...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Su PR, Li DQ, Feng DG. A host-based anomaly intrusion detection model based on genetic programming
Abstract: Intrusion detection is the process of supervising the events taking place in a computer sy...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
D.Phil. (Electrical Engineering)Abstract: The network intrusion detection is a system whose primary ...
<p align="justify">This paper describes the data mining process to obtain classification rules over ...
The exponential growth and development of the internet has created many problems on network security...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Anomaly detection as a kind of intrusion detection is good at detecting the unknown attacks or new a...
In this paper, we present a multi-objective genetic fuzzy system for anomaly intrusion detection. Th...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
An Intrusion Detection System should optimally be capable of detecting both known attacks (misuse de...
Network security is of primary concerned now days for large organizations. Various types of Intrusio...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
As the Internet services spread all over the world, many kinds of security threats are increasing. ...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Su PR, Li DQ, Feng DG. A host-based anomaly intrusion detection model based on genetic programming
Abstract: Intrusion detection is the process of supervising the events taking place in a computer sy...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
D.Phil. (Electrical Engineering)Abstract: The network intrusion detection is a system whose primary ...
<p align="justify">This paper describes the data mining process to obtain classification rules over ...
The exponential growth and development of the internet has created many problems on network security...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Anomaly detection as a kind of intrusion detection is good at detecting the unknown attacks or new a...