In the advent of the cyber world, all know that cyber security is randomly used research area for researchers to secure host, network, and data because of increasingly complex attacks. In the advent of anomaly-based intrusion detection system, various techniques are applied to detect intrusion on system or network. This approach attains an extreme detection rate and accuracy but there may be overhead acquired to build and training them. The objective of this paper is to detect the intrusion of a system by proposing a Data mining technique which is based on supervised learning algorithm for training dataset. Artificial neural network (ANN) and Ant Colony Optimization (ACO) with feature selection are the basics of the proposed scheme. ACO wor...
Recently, with the technological and digital revolution, the security of data is very crucial as a m...
The exponential growth of internet communications and increasing dependency of users upon software-b...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
An incursion into the computer network or system in issue occurs whenever there is an attempt made t...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018.With the cons...
Challenge of designing and building of the current Network Intrusion Detection System not only impro...
With the increasing number of computers being connected to the Internet, security of an information ...
As information technology grows, network security is a significant issue and challenge. The intrusio...
Intrusion Detection Systems (IDSs) analyse network traffic to identify suspicious patterns which in...
Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS 2017), Dublin, Irel...
Intrusion means illegal entry or unwelcome addition of the system. So, Intrusion detection system is...
This piece of work researches the intrusion detection problem of the network sanctuary; the primary ...
Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly b...
With the growth of cyber attacks, information safety has become an important issue all over the worl...
Abstract. Learning program’s behavior using machine learning tech-niques based on system call audit ...
Recently, with the technological and digital revolution, the security of data is very crucial as a m...
The exponential growth of internet communications and increasing dependency of users upon software-b...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
An incursion into the computer network or system in issue occurs whenever there is an attempt made t...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018.With the cons...
Challenge of designing and building of the current Network Intrusion Detection System not only impro...
With the increasing number of computers being connected to the Internet, security of an information ...
As information technology grows, network security is a significant issue and challenge. The intrusio...
Intrusion Detection Systems (IDSs) analyse network traffic to identify suspicious patterns which in...
Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS 2017), Dublin, Irel...
Intrusion means illegal entry or unwelcome addition of the system. So, Intrusion detection system is...
This piece of work researches the intrusion detection problem of the network sanctuary; the primary ...
Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly b...
With the growth of cyber attacks, information safety has become an important issue all over the worl...
Abstract. Learning program’s behavior using machine learning tech-niques based on system call audit ...
Recently, with the technological and digital revolution, the security of data is very crucial as a m...
The exponential growth of internet communications and increasing dependency of users upon software-b...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...