2016
DOI: 10.1007/s00542-016-2873-8
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy min–max neural network and particle swarm optimization based intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(7 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…This IDS was tested using KDD '99. A year later, Azad and Jha [89] proposed another IDS utilizing a fuzzy min-max neural network as a classifier and particle swarm for optimization, again testing it with KDD '99.…”
Section: E Cybercrime Detection Using Fuzzy Logic Neural Networkmentioning
confidence: 99%
“…This IDS was tested using KDD '99. A year later, Azad and Jha [89] proposed another IDS utilizing a fuzzy min-max neural network as a classifier and particle swarm for optimization, again testing it with KDD '99.…”
Section: E Cybercrime Detection Using Fuzzy Logic Neural Networkmentioning
confidence: 99%
“…Salunkhe and Mali [45] proposed ensemble classifier, combined different base classifiers, the data detection model 1 extracted original dataset and created data subsets model 2 extracting original training data feature subset and created feature subset, then combined outputs of two models obtained the final prediction by ensemble classifier whether intrusion exist or not. This technique evaluated on KDD CUP 1999 dataset, performance tested for more number of attack categories.…”
Section: Related Workmentioning
confidence: 99%
“…Kudłacik et al [10] presented an intrusion detection method based on a fuzzy approach. Azad et al [11] introduced an intrusion detection system which is based on the fuzzy min, fuzzy max neural network and the particle swarm optimization. Ramakrishnan et al [12] proposed an entropy-based feature selection to select the important features, layered fuzzy control language to generate fuzzy rules, and layered classifier to detect various network attacks namely neptune, smurf, back, and mailbomb.…”
Section: Related Workmentioning
confidence: 99%