Due to our increased dependence on Internet and growing number of intrusion incidents, building effective intrusion detection systems are essential for protecting Internet resources and yet it is a great challenge. In literature, many re-searchers utilized Artificial Neural Networks (ANN) in supervised learning based intrusion detection successfully. Here, ANN maps the network traffic into predefined classes i.e. normal or specific attack type based upon training from label dataset. However, for ANN-based IDS, detection rate (DR) and false positive rate (FPR) are still needed to be improved. In this study, we propose an ensemble approach, called MANNE, for ANN-based IDS that evolves ANNs by Multi-Ob-jective Genetic Algorithm to solve the pr...
Machine-learning techniques have received popularity in the intrusion-detection systems in recent ye...
Copyright © 2013 G. Kumar and K. Kumar. This is an open access article distributed under the Creativ...
Proper security solutions in the cyber world are crucial for enforcing network security by providing...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Of late, Network Security Research is taking center stage given the vulnerability of computing ecosy...
Accompanying the benefits of Internet are various techniques of compromising the integrity and avail...
For the last decade it has become commonplace to evaluate machine learning techniques for network ba...
An intrusion detection system (IDS) is an important feature to employ in order to protect a system a...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
In supervised learning-based classification, ensembles have been successfully employed to different ...
For the last decade it has become commonplace to evaluate machine learning techniques for network ba...
An intrusion detection system's (IDS) key role is to recognise anomalous activities from both inside...
An anomaly-based intrusion detection system (A-IDS) provides a critical aspect in a modern computing...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
With the improvements in information systems, intrusion detection systems (IDS) become more importan...
Machine-learning techniques have received popularity in the intrusion-detection systems in recent ye...
Copyright © 2013 G. Kumar and K. Kumar. This is an open access article distributed under the Creativ...
Proper security solutions in the cyber world are crucial for enforcing network security by providing...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Of late, Network Security Research is taking center stage given the vulnerability of computing ecosy...
Accompanying the benefits of Internet are various techniques of compromising the integrity and avail...
For the last decade it has become commonplace to evaluate machine learning techniques for network ba...
An intrusion detection system (IDS) is an important feature to employ in order to protect a system a...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
In supervised learning-based classification, ensembles have been successfully employed to different ...
For the last decade it has become commonplace to evaluate machine learning techniques for network ba...
An intrusion detection system's (IDS) key role is to recognise anomalous activities from both inside...
An anomaly-based intrusion detection system (A-IDS) provides a critical aspect in a modern computing...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
With the improvements in information systems, intrusion detection systems (IDS) become more importan...
Machine-learning techniques have received popularity in the intrusion-detection systems in recent ye...
Copyright © 2013 G. Kumar and K. Kumar. This is an open access article distributed under the Creativ...
Proper security solutions in the cyber world are crucial for enforcing network security by providing...