International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012) 2012
DOI: 10.1109/icprime.2012.6208344
|View full text |Cite
|
Sign up to set email alerts
|

Network programming and mining classifier for intrusion detection using probability classification

Abstract: In conventional network security simply relies on mathematical algorithms and low counter measures to taken to prevent intrusion detection system, although most of this approaches in terms of theoretically challenged to implement. Therefore, a variety of algorithms have been committed to this challenge. Instead of generating large number of rules the evolution optimization techniques like Genetic Network Programming (GNP) can be used .The GNP is based on directed graph, In this paper the security issues relate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…This dataset is still the most trustful and credible public benchmark dataset [53,54,55,56,57,58,59] for evaluating network intrusion detection algorithms. In the dataset, 41 features including 9 categorical features and 32 continuous features are extracted for each network connection.…”
Section: Methodsmentioning
confidence: 99%
“…This dataset is still the most trustful and credible public benchmark dataset [53,54,55,56,57,58,59] for evaluating network intrusion detection algorithms. In the dataset, 41 features including 9 categorical features and 32 continuous features are extracted for each network connection.…”
Section: Methodsmentioning
confidence: 99%
“…In 2012, P. Prasenna et al [19] suggested that in conventional network security simply relies on mathematical algorithms and low counter measures to taken to prevent intrusion detection system, although most of this approaches in terms of theoretically challenged to implement. Authors suggest that instead of generating large number of rules the evolution optimization techniques like Genetic Network Programming (GNP) can be used .The GNP is based on directed graph.…”
Section: Literature Surveymentioning
confidence: 99%
“…Emp irical results shows that selected reduced attributes give better performance to design IDS that is efficient and effective for network intrusion detection. Prasenna P et al [76] has proposed network programming and mining classifier for intrusion detection using probability classification. This method can sufficient to evaluate misuse and anomaly detection.…”
Section: Anomaly and Misuse Detectionmentioning
confidence: 99%