Copyright © 2013 G. Kumar and K. Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The propos...
The emergence of ground-breaking technologies such as artificial intelligence, cloud computing, big ...
As the popularity and usage of Internet increases security concerns are also become important. Every...
Intrusion detection has drawn considerable interest as researchers endeavor to produce efficient mod...
Intrusion detection is an indispensable part of a security system. Since new attacks are emerging ev...
The internet and computer networks have become an essential tool in distributed computing organisati...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Due to our increased dependence on Internet and growing number of intrusion incidents, building effe...
Of late, Network Security Research is taking center stage given the vulnerability of computing ecosy...
Background: Building an effective Intrusion detection system in a multi-attack classification enviro...
An Intrusion detection system's main aim is to identify the normal and intrusive activities. The obj...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
This paper represents the first step in an on-going work for designing an unsupervised method based ...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Undoubtedly, the advancements in Machine Learning (ML) and especially ensemble learning models enabl...
The emergence of ground-breaking technologies such as artificial intelligence, cloud computing, big ...
As the popularity and usage of Internet increases security concerns are also become important. Every...
Intrusion detection has drawn considerable interest as researchers endeavor to produce efficient mod...
Intrusion detection is an indispensable part of a security system. Since new attacks are emerging ev...
The internet and computer networks have become an essential tool in distributed computing organisati...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Due to our increased dependence on Internet and growing number of intrusion incidents, building effe...
Of late, Network Security Research is taking center stage given the vulnerability of computing ecosy...
Background: Building an effective Intrusion detection system in a multi-attack classification enviro...
An Intrusion detection system's main aim is to identify the normal and intrusive activities. The obj...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
This paper represents the first step in an on-going work for designing an unsupervised method based ...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Undoubtedly, the advancements in Machine Learning (ML) and especially ensemble learning models enabl...
The emergence of ground-breaking technologies such as artificial intelligence, cloud computing, big ...
As the popularity and usage of Internet increases security concerns are also become important. Every...
Intrusion detection has drawn considerable interest as researchers endeavor to produce efficient mod...