2019
DOI: 10.1007/s12652-019-01569-8
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 64 publications
(17 citation statements)
references
References 32 publications
0
17
0
Order By: Relevance
“…The results showed to decrease the number of features the use SVM classification network and accuracy and speed to detection. In [54] proposed the anomaly-based ID using a multi-objective grey wolf optimization (GWO) algorithm. The GWO algorithm has been designated as a feature selection NSL-KDD dataset was used to illustrate the usefulness of the approach across multiple attack scenarios.…”
Section: Icmpv6 Machine Learning-based Aidsmentioning
confidence: 99%
“…The results showed to decrease the number of features the use SVM classification network and accuracy and speed to detection. In [54] proposed the anomaly-based ID using a multi-objective grey wolf optimization (GWO) algorithm. The GWO algorithm has been designated as a feature selection NSL-KDD dataset was used to illustrate the usefulness of the approach across multiple attack scenarios.…”
Section: Icmpv6 Machine Learning-based Aidsmentioning
confidence: 99%
“…Various optimization methods are utilized for the feature selection purposes, such as the genetic algorithm [6][7] [8], PSO [9][10] [11], GWO [12] [13]. For feature selection [14][15], a certain hybrid version of the optimization algorithm was used.…”
Section: Features Selectionmentioning
confidence: 99%
“…NIDS are more suited in highspeed network infrastructure, and it is typically used to check network traffic for illegitimate and malicious packets. There are two types of NIDS characterized by the kind of network traffic representation used, either packet-based or flow-based [31], [32], which will be discussed in the following subsections.…”
Section: Network Traffic Representationmentioning
confidence: 99%