2021 2nd Global Conference for Advancement in Technology (GCAT) 2021
DOI: 10.1109/gcat52182.2021.9587486
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System using Metaheuristic Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The findings demonstrate notable improvements in detection rate, accuracy, and false alarm reduction compared to existing state-of-the-art classifiers. [16] propose a high-performance classification algorithm, SEKS, and SEIDS, for improving attack detection in an IDS. Their approach combines clustering, classification, and metaheuristic algorithms to enhance accuracy and detect unfamiliar attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The findings demonstrate notable improvements in detection rate, accuracy, and false alarm reduction compared to existing state-of-the-art classifiers. [16] propose a high-performance classification algorithm, SEKS, and SEIDS, for improving attack detection in an IDS. Their approach combines clustering, classification, and metaheuristic algorithms to enhance accuracy and detect unfamiliar attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Key findings [9] Feature selection Usage of Information Gain (IG), Gain Ratio (GR), Symmetrical Un-certainty (SU), Relief-F (R-F), One-R (OR) and Chi-Square (CS) for feature selection from network traffic to create IDS [10] Recursive feature elimination mechanism and a decision tree-based classifier Improved accuracy in comparison to literature [11] MultiTree algorithm A selection of base classifiers such as decision tree, random forest, kNN, and DNN is employed to enhance the overall detection effectiveness [12] Hybrid approach PSO, GA and DE used in tandem with kNN and DT for classification [13] Metaheuristic algorithm Only GA is used for feature selection [14] Metaheuristic MQBHOA MQBHOA algorithm used in tandem with KNN for classification [15] Machine learning RF with KNN, DR, SVM, LR, NB classifiers used for classification [16] Hybrid approach Clustering, classification and metaheuristic algorithms used…”
Section: Techniquementioning
confidence: 99%
“…Calculating the fuzzy coefficient of each cluster and figuring out how closely the elements are related to each other in the same cluster by Equation (8). Otherwise, the operation will be repeated from Equation (4) for points that do not belong to any cluster.…”
Section: Editing Clustermentioning
confidence: 99%
“…As a result, such a system is incapable of adapting to the speeds at which cyber threats operate. As a result, swarm intelligence (SI) adds flexibility and learning capability to cyber protection systems to combat cybercrime [7][8][9].…”
mentioning
confidence: 99%