An incursion into the computer network or system in issue occurs whenever there is an attempt made to circumvent the defences that are in place. Training and examination are the two basic components that make up the intrusion detection system (IDS) and each one may be analysed separately. During training, a number of distinct models are built, each of which is able to distinguish between normal and abnormal behaviours that are included within the dataset. This article proposes a combination of ant colony optimization (ACO) and the firefly approach for feature selection. The final outcome of giving careful thought to the selection of features will eventually result in greater accuracy of categorisation. When classifying various sorts of feat...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
The main goal of intrusion detection system (IDS) is to monitor the network performance and to inves...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
Research into the use of machine learning techniques for network intrusion detection, especially car...
In the advent of the cyber world, all know that cyber security is randomly used research area for re...
In evaluating performance of 2 supervised machine learning algorithms like SVM (Support Vector Machi...
In current day information transmitted from one place to another by using network communication tech...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
The security of computer networks is of great importance. But, with the proliferation of electronic ...
Intrusion Detection Systems (IDS) still have unresolved problems, namely the lack of accuracy in att...
Network intrusion detection is a vital element of cybersecurity, focusing on identification of malic...
Network security plays a critical role in our lives because of the threats and attacks to which we a...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
Given the importance of the computer systems in our daily life today, it is decisive to be able to p...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
The main goal of intrusion detection system (IDS) is to monitor the network performance and to inves...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
Research into the use of machine learning techniques for network intrusion detection, especially car...
In the advent of the cyber world, all know that cyber security is randomly used research area for re...
In evaluating performance of 2 supervised machine learning algorithms like SVM (Support Vector Machi...
In current day information transmitted from one place to another by using network communication tech...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
The security of computer networks is of great importance. But, with the proliferation of electronic ...
Intrusion Detection Systems (IDS) still have unresolved problems, namely the lack of accuracy in att...
Network intrusion detection is a vital element of cybersecurity, focusing on identification of malic...
Network security plays a critical role in our lives because of the threats and attacks to which we a...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
Given the importance of the computer systems in our daily life today, it is decisive to be able to p...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
The main goal of intrusion detection system (IDS) is to monitor the network performance and to inves...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...