Intrusion Detection System (IDS) is one of the key security components in today’s networking environment. A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. GAs are search algorithms which are based on the principles of natural selection and genetics. GA functions on a number of possible solutions using the principle of...
Internet connection nowadays has become one of the essential requirements to execute our daily activ...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
2017 International Conference on Computer Science and Engineering (UBMK) -- OCT 05-08, 2017 -- Antal...
An Intrusion detection system's main aim is to identify the normal and intrusive activities. The obj...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
Network security is of primary concerned now days for large organizations. Various types of Intrusio...
Abstract — Intrusion Detection Systems (IDSs) detects the network attacks by scanning each data pack...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
With the rapid expansion of computer networks during the past decade, security has become a crucial ...
An Intrusion detection system’s main aim is to identify the normal and intrusive activities. The obj...
The existing NIDSs involve various mechanisms in order to identify the patterns related to the netwo...
Information that is not properly secured has the tendency of being vulnerable to intrusions and thre...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
This paper represents the first step in an on-going work for designing an unsupervised method based ...
One of the most widely acknowledged purposes of using the internet is data transfer; it is an essent...
Internet connection nowadays has become one of the essential requirements to execute our daily activ...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
2017 International Conference on Computer Science and Engineering (UBMK) -- OCT 05-08, 2017 -- Antal...
An Intrusion detection system's main aim is to identify the normal and intrusive activities. The obj...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
Network security is of primary concerned now days for large organizations. Various types of Intrusio...
Abstract — Intrusion Detection Systems (IDSs) detects the network attacks by scanning each data pack...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
With the rapid expansion of computer networks during the past decade, security has become a crucial ...
An Intrusion detection system’s main aim is to identify the normal and intrusive activities. The obj...
The existing NIDSs involve various mechanisms in order to identify the patterns related to the netwo...
Information that is not properly secured has the tendency of being vulnerable to intrusions and thre...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
This paper represents the first step in an on-going work for designing an unsupervised method based ...
One of the most widely acknowledged purposes of using the internet is data transfer; it is an essent...
Internet connection nowadays has become one of the essential requirements to execute our daily activ...
Proceeding of: International Conference on Availability, Reliability, and Security, 2010. ARES '10...
2017 International Conference on Computer Science and Engineering (UBMK) -- OCT 05-08, 2017 -- Antal...