2019
DOI: 10.1007/s12065-019-00293-8
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 49 publications
0
29
0
Order By: Relevance
“…The adaptability and flexibility of the approach need to be enhanced. Dwivedi et al (Dwivedi et al 2020) have proposed a method for anomaly detection where combined Ensemble of Feature Selection (EFS) and one optimization algorithm named Adaptive Grasshopper Optimization Algorithm (AGOA) for identifying different types of attacks. EFS's role is to rank the attributes for further feature selection through AGOA to work as the input in predicting network traffic behavior.…”
Section: Related Workmentioning
confidence: 99%
“…The adaptability and flexibility of the approach need to be enhanced. Dwivedi et al (Dwivedi et al 2020) have proposed a method for anomaly detection where combined Ensemble of Feature Selection (EFS) and one optimization algorithm named Adaptive Grasshopper Optimization Algorithm (AGOA) for identifying different types of attacks. EFS's role is to rank the attributes for further feature selection through AGOA to work as the input in predicting network traffic behavior.…”
Section: Related Workmentioning
confidence: 99%
“…SVM is a machine learning technique to facilitate categorization between two groups. In this, a hyperplane is formed to differentiate between positive and negative samples considering the principle of structural risk minimization [29]. An anticipated characteristic of SVM is that this carries out the classification utilizing support vectors instead of the whole data set, and therefore this is enormously robust for outliers and predicts effectively.…”
Section: Support Vector Machinementioning
confidence: 99%
“…These data have become the targets of illegal activities, which has posed a major threat to network security [1]. Luckily, the intrusion detection system (IDS) [2] can solve these problems well. As an active security technology, IDS monitors networks or hosts and alerts when attacks are detected.…”
Section: Introductionmentioning
confidence: 99%