The increasing number of security attacks have inspired researchers to employ various classifiers, such as support vector machines (SVMs), to deal with them in Intrusion detection systems (IDSs). This paper presents a comprehensive study and investigation of the SVM-based intrusion detection and feature selection systems proposed in the literature. It first presents the essential concepts and background knowledge about security attacks, IDS, and SVM classifiers. It then provides a taxonomy of the SVM-based IDS schemes and describes how they have adapted numerous types of SVM classifiers in detecting various types of anomalies and intrusions. Moreover, it discusses the main contributions of the investigated schemes and highlights the algorit...
Soft computing techniques are more and more widely used to solve a variety of practical problems. Th...
This paper proposes a novel approach for intrusion detection system based on sampling with Least Squ...
Abstract: Problem statement: Past few years have witnessed a growing recognition of intelligent tech...
The increasing number of security attacks have inspired researchers to employ various classifiers, s...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
Security is one of the main requirements of the current computer systems, and recently it gains much...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
These days, security threats detection, generally discussed to as intrusion, has befitted actual sig...
Computational intelligence (CI) methods are increasingly being used for problem solving, and CI-type...
Abstract — In today’s era the security of computer system is of great concern. Because the last few ...
Copyright © 2014 Md. Al Mehedi Hasan et al. This is an open access article distributed under the Cre...
With the development of web applications nowadays, intrusions represent a crucial aspect in terms of...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
As the research increased in computer science highlight the scientists mind for the growing research...
Abstract: The KDD Cup '99 is commonly used dataset for training and testing IDS machine learnin...
Soft computing techniques are more and more widely used to solve a variety of practical problems. Th...
This paper proposes a novel approach for intrusion detection system based on sampling with Least Squ...
Abstract: Problem statement: Past few years have witnessed a growing recognition of intelligent tech...
The increasing number of security attacks have inspired researchers to employ various classifiers, s...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
Security is one of the main requirements of the current computer systems, and recently it gains much...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
These days, security threats detection, generally discussed to as intrusion, has befitted actual sig...
Computational intelligence (CI) methods are increasingly being used for problem solving, and CI-type...
Abstract — In today’s era the security of computer system is of great concern. Because the last few ...
Copyright © 2014 Md. Al Mehedi Hasan et al. This is an open access article distributed under the Cre...
With the development of web applications nowadays, intrusions represent a crucial aspect in terms of...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
As the research increased in computer science highlight the scientists mind for the growing research...
Abstract: The KDD Cup '99 is commonly used dataset for training and testing IDS machine learnin...
Soft computing techniques are more and more widely used to solve a variety of practical problems. Th...
This paper proposes a novel approach for intrusion detection system based on sampling with Least Squ...
Abstract: Problem statement: Past few years have witnessed a growing recognition of intelligent tech...