With the emergence of technologies and the increasing number of users of the Internet, such as the Internet of Things (IoT) paradigm, there are new and modern efforts to invade networks and computer systems. Many researchers have developed various artificial intelligence-based algorithms to detect these attacks. For network security they focus on machine learning models that are used in IoT and intrusion detection. In this study, we have proposed a machine learning based intrusion detection system which is a combination of support vector machine (SVM) and Genetic Algorithm (GA). GA is basically used for feature selection and parameter optimization of SVM models. The performance of a GA-based SVM model is evaluated on an KDD Cup 99 intrusion...
Intrusion Detection Systems (IDS) have become a necessary component of the computer and information ...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
With the development of web applications nowadays, intrusions represent a crucial aspect in terms of...
Recently, Networks have developed quickly during the last many years, and attacks on network infrast...
The computer network technologies are evolving fast, and the development of internet technology is m...
Computer network technologies are evolving fast and the development of internet technology is more q...
It is important problems to increase the detection rates and reduce false positive rates in Intrusio...
In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is proposed and ...
In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is proposed and ...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
Computer networks have expanded significantly in use and in numbers. This expansion makes them targe...
Cloud computing is expected to provide on-demand, agile, and elastic services. Cloud networking exte...
Society has grown to rely on Internet services, and the number of Internet users increases every day...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Intrusion Detection Systems (IDS) have become a necessary component of the computer and information ...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...
With the development of web applications nowadays, intrusions represent a crucial aspect in terms of...
Recently, Networks have developed quickly during the last many years, and attacks on network infrast...
The computer network technologies are evolving fast, and the development of internet technology is m...
Computer network technologies are evolving fast and the development of internet technology is more q...
It is important problems to increase the detection rates and reduce false positive rates in Intrusio...
In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is proposed and ...
In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is proposed and ...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
Computer networks have expanded significantly in use and in numbers. This expansion makes them targe...
Cloud computing is expected to provide on-demand, agile, and elastic services. Cloud networking exte...
Society has grown to rely on Internet services, and the number of Internet users increases every day...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Intrusion Detection Systems (IDS) have become a necessary component of the computer and information ...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Nowadays it is very important to maintain a high level security to ensure safe and trusted communica...