Intrusion detection is mainly achieved by using optimization algorithms. The need for optimization algorithms for intrusion detection is necessitated by the increasing number of features in audit data, as well as the performance failure of the human-based smart intrusion detection system (IDS) in terms of their prolonged training time and classification accuracy. This article presents an improved intrusion detection technique for binary classification. The proposal is a combination of different optimizers, including Rao optimization algorithm, extreme learning machine (ELM), support vector machine (SVM), and logistic regression (LR) (for feature selection & weighting), as well as a hybrid Rao-SVM algorithm with supervised machine learning (...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Optimizing the detection of intrusions is becoming more crucial due to the continuously rising rates...
Most of the intrusion detection systems are developed based on optimization algorithms as a result o...
Optimization algorithms are widely used for the identification of intrusion. This is attributable to...
Many optimisation-based intrusion detection algorithms have been developed and are widely used for i...
Nowadays it is imperative to maintain a high level of security to ensure secure communication of inf...
In this paper, an existing rule-based intrusion detection system (IDS) is made more intelligent thro...
The principal focus of the present dissertation is to develop new machine learning methods for incre...
In recent times, various machine learning classifiers are used to improve network intrusion detectio...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
Computational intelligence (CI) methods are increasingly being used for problem solving, and CI-type...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
Intrusion detection continues to be an active research field. Even after 20 years of research, the i...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Optimizing the detection of intrusions is becoming more crucial due to the continuously rising rates...
Most of the intrusion detection systems are developed based on optimization algorithms as a result o...
Optimization algorithms are widely used for the identification of intrusion. This is attributable to...
Many optimisation-based intrusion detection algorithms have been developed and are widely used for i...
Nowadays it is imperative to maintain a high level of security to ensure secure communication of inf...
In this paper, an existing rule-based intrusion detection system (IDS) is made more intelligent thro...
The principal focus of the present dissertation is to develop new machine learning methods for incre...
In recent times, various machine learning classifiers are used to improve network intrusion detectio...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
Computational intelligence (CI) methods are increasingly being used for problem solving, and CI-type...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
With the rapid growth of digital technology communications are overwhelmed by network data traffic. ...
Intrusion detection continues to be an active research field. Even after 20 years of research, the i...
© 2014 IEEE. Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing ...
Some of the main challenges in developing an effective network-based intrusion detection system (IDS...
Optimizing the detection of intrusions is becoming more crucial due to the continuously rising rates...