As computer technology continues to develop, computer networks are now widely used. As a result, there are many new intrusion types appearing and information security is becoming increasingly important. Although there are many kinds of intrusion detection systems deployed to protect our modern networks, we are constantly hearing reports of hackers causing major disruptions. Since existing technologies all have some disadvantages, we utilize algorithms, such as the fuzzy C-means (FCM) and the support vector machine (SVM) algorithms to improve these technologies. Using these two algorithms alone has some disadvantages leading to a low classification accuracy rate. In the case of FCM, self-adaptability is weak, and the algorithm is sensitive t...
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intru...
Computer network technologies are evolving fast and the development of internet technology is more q...
With the rapid expansion of computer networks during the past decade, security has become a crucial ...
Anomaly detection as a kind of intrusion detection is good at detecting the unknown attacks or new a...
Abstract: To address the issue in fuzzy C-means algorithm (FCM) that clustering number has to be pr...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Recently, Networks have developed quickly during the last many years, and attacks on network infrast...
Cloud computing is expected to provide on-demand, agile, and elastic services. Cloud networking exte...
Society has grown to rely on Internet services, and the number of Internet users increases every day...
Intrusion detection continues to be an active research field. Even after 20 years of research, the i...
AbstractIn this paper, we propose a fuzzy clustering model to find the proper cluster structures fro...
IDM design and implementation remain a difficult undertaking and an unsolved research topic. Multi-d...
With the emergence of technologies and the increasing number of users of the Internet, such as the I...
The exponential growth and development of the internet has created many problems on network security...
The Fuzzy C-Means (FCM) is a widely used clustering algorithm in unsupervised learning. It always co...
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intru...
Computer network technologies are evolving fast and the development of internet technology is more q...
With the rapid expansion of computer networks during the past decade, security has become a crucial ...
Anomaly detection as a kind of intrusion detection is good at detecting the unknown attacks or new a...
Abstract: To address the issue in fuzzy C-means algorithm (FCM) that clustering number has to be pr...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Recently, Networks have developed quickly during the last many years, and attacks on network infrast...
Cloud computing is expected to provide on-demand, agile, and elastic services. Cloud networking exte...
Society has grown to rely on Internet services, and the number of Internet users increases every day...
Intrusion detection continues to be an active research field. Even after 20 years of research, the i...
AbstractIn this paper, we propose a fuzzy clustering model to find the proper cluster structures fro...
IDM design and implementation remain a difficult undertaking and an unsolved research topic. Multi-d...
With the emergence of technologies and the increasing number of users of the Internet, such as the I...
The exponential growth and development of the internet has created many problems on network security...
The Fuzzy C-Means (FCM) is a widely used clustering algorithm in unsupervised learning. It always co...
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intru...
Computer network technologies are evolving fast and the development of internet technology is more q...
With the rapid expansion of computer networks during the past decade, security has become a crucial ...