Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its ef...
Computer network technologies are evolving fast and the development of internet technology is more q...
Network security plays a critical role in our lives because of the threats and attacks to which we a...
Abstract- During the past few years, huge amount of network attacks have increased the requirement o...
Copyright © 2015 P. Amudha et al. This is an open access article distributed under the Creative Comm...
In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studie...
In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studie...
Sophisticated Intrusion attacks against various types of networks are ever increasing today with the...
In order to protect computing systems from malicious attacks, network intrusion detection systems ha...
One of the most persistent challenges concerning network security is to build a model capable of det...
Sophisticated Intrusion attacks against various types of networks are ever increasing today with the...
The exponential growth of internet communications and increasing dependency of users upon software-b...
This paper describes the advantages of using Evolutionary Algorithms (EA) for feature selection on n...
Our world today relies heavily on informatics and the internet, as computers and communications netw...
The computer network technologies are evolving fast, and the development of internet technology is m...
In recent years, the widespread use of the Internet has created many issues, especially in the area ...
Computer network technologies are evolving fast and the development of internet technology is more q...
Network security plays a critical role in our lives because of the threats and attacks to which we a...
Abstract- During the past few years, huge amount of network attacks have increased the requirement o...
Copyright © 2015 P. Amudha et al. This is an open access article distributed under the Creative Comm...
In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studie...
In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studie...
Sophisticated Intrusion attacks against various types of networks are ever increasing today with the...
In order to protect computing systems from malicious attacks, network intrusion detection systems ha...
One of the most persistent challenges concerning network security is to build a model capable of det...
Sophisticated Intrusion attacks against various types of networks are ever increasing today with the...
The exponential growth of internet communications and increasing dependency of users upon software-b...
This paper describes the advantages of using Evolutionary Algorithms (EA) for feature selection on n...
Our world today relies heavily on informatics and the internet, as computers and communications netw...
The computer network technologies are evolving fast, and the development of internet technology is m...
In recent years, the widespread use of the Internet has created many issues, especially in the area ...
Computer network technologies are evolving fast and the development of internet technology is more q...
Network security plays a critical role in our lives because of the threats and attacks to which we a...
Abstract- During the past few years, huge amount of network attacks have increased the requirement o...