2021
DOI: 10.1016/j.jisa.2020.102721
|View full text |Cite|
|
Sign up to set email alerts
|

A novel sophisticated hybrid method for intrusion detection using the artificial immune system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…Farzadnia et al [36], proposed a novel hybrid method for Intrusion Detection System (IDS) using an Artificial Immune System (AIS). The system consisted of two defensive lines.…”
Section: Discussing the Use Of Conditionally Classified "Distributed" Ai Methods In Cybersecuritymentioning
confidence: 99%
“…Farzadnia et al [36], proposed a novel hybrid method for Intrusion Detection System (IDS) using an Artificial Immune System (AIS). The system consisted of two defensive lines.…”
Section: Discussing the Use Of Conditionally Classified "Distributed" Ai Methods In Cybersecuritymentioning
confidence: 99%
“…For the binary classification problem, let the output probability of the first sample be p . Bringing it into equation (11), the expression of the Gini coefficient of its probability distribution can be obtained as:…”
Section: V-detector Intrusion Detection Model Buildingmentioning
confidence: 99%
“…Therefore, intrusion detection belongs to a typical classification problem [9][10]. As for SVM, one of the most typical classification algorithms, its most prominent feature is the use of the structural risk minimization principle for classification problems such as high dimensionality and nonlinearity, which improves the generalization ability of the learning machine [11][12]. It is due to the many advantages that exist in SVMs that a large number of researchers have successively applied SVMs to the field of intrusion detection.…”
Section: Introductionmentioning
confidence: 99%
“…Cybercrime activities on the internet primarily involve communication-based attacks. Detecting malicious network traffic with minimal cost is increasingly challenging for information security researchers [5]. Although there has been considerable interest in understanding the cyber threat landscape of IoT networks and devising security methodologies incorporating artificial intelligence (AI), a gap exists in distributed architecture.…”
Section: Introductionmentioning
confidence: 99%