In this paper, an existing rule-based intrusion detection system (IDS) is made more intelligent through the application of machine learning. Snort was chosen as it is an open source software and though it was performing well, it showed false positives (FPs). To find the best performing machine learning algorithms (MLAs) to use with Snort so as to improve its detection, we tested some algorithms on three available datasets. Support vector machine (SVM) was chosen along with fuzzy logic and decision tree based on their accuracy. Combined versions of algorithms through ensemble SVM along with other variants were tried on the generated traffic of normal and malicious packets at 10Gbps. Optimized versions of the SVM along with firefly and ant co...
Enhancing detection process and accuracy of Intrusion Detection (ID) using three machine-learning al...
In evaluating performance of 2 supervised machine learning algorithms like SVM (Support Vector Machi...
Computer network technologies are evolving fast and the development of internet technology is more q...
This study investigates the performance of two open source intrusion detection systems (IDSs) namely...
The current state of intrusion detection tools is insufficient because they often operate based on s...
Intrusion detection is mainly achieved by using optimization algorithms. The need for optimization a...
Intrusion Detection System (IDS) is a dynamic network security defense technology that can help to p...
International audienceWith the growth of internet world has transformed into a global market with al...
The principal focus of the present dissertation is to develop new machine learning methods for incre...
Most of the intrusion detection systems are developed based on optimization algorithms as a result o...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
Network security technology has become crucial in protecting government and industry computing infra...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
The world has experienced a radical change due to the internet. As a matter of fact, it assists peop...
Advancement in network technology has vastly increased the usage of the Internet. Consequently, ther...
Enhancing detection process and accuracy of Intrusion Detection (ID) using three machine-learning al...
In evaluating performance of 2 supervised machine learning algorithms like SVM (Support Vector Machi...
Computer network technologies are evolving fast and the development of internet technology is more q...
This study investigates the performance of two open source intrusion detection systems (IDSs) namely...
The current state of intrusion detection tools is insufficient because they often operate based on s...
Intrusion detection is mainly achieved by using optimization algorithms. The need for optimization a...
Intrusion Detection System (IDS) is a dynamic network security defense technology that can help to p...
International audienceWith the growth of internet world has transformed into a global market with al...
The principal focus of the present dissertation is to develop new machine learning methods for incre...
Most of the intrusion detection systems are developed based on optimization algorithms as a result o...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
Network security technology has become crucial in protecting government and industry computing infra...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
The world has experienced a radical change due to the internet. As a matter of fact, it assists peop...
Advancement in network technology has vastly increased the usage of the Internet. Consequently, ther...
Enhancing detection process and accuracy of Intrusion Detection (ID) using three machine-learning al...
In evaluating performance of 2 supervised machine learning algorithms like SVM (Support Vector Machi...
Computer network technologies are evolving fast and the development of internet technology is more q...