2014
DOI: 10.6029/smartcr.2014.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Using Gravitational Search Algorithm to Support Artificial Neural Network in Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Researchers have suggested several optimization strategies to achieve high precision in intrusion detection [5]. Previous work and methods will be highlighted in this topic, such as the hierarchical clustering algorithm [6], removal feature selection and support vector machine [7], gravitational search algorithm [5], and pattern recognition (Ernesto et al 2015).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers have suggested several optimization strategies to achieve high precision in intrusion detection [5]. Previous work and methods will be highlighted in this topic, such as the hierarchical clustering algorithm [6], removal feature selection and support vector machine [7], gravitational search algorithm [5], and pattern recognition (Ernesto et al 2015).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Dastanpour et al [5] proposed the Gravitational Search Algorithm (GSA) to assist ANN in IDS. The GSA is a popular machine learning algorithm based on gravity law and mass interaction.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The results showed that the classification accuracy of the proposed system achieved a faster convergence speed and better detection accuracy compared with a single SVM classifier. Dastanpour et al (2014) presented an approach for an IDS composed of the ANN algorithm and GSA optimization. The proposed system consists of two stages.…”
Section: Kuang Et Al (2014) Proposed a New Intrusion Detection Systementioning
confidence: 99%
“…In this study, the experiments were performed separately for all four attack classes (probe, DoS, R2L and U2R) by randomly selecting data corresponding to that particular attack class and normal data only. Data scaling was done to ensure the training dataset was within the range of [0,1]. In this study, the number of iterations was 500 iterations and all the experiments were repeated 500 times (iterations) and the results were averaged.…”
Section: Expermental Setupmentioning
confidence: 99%
“…Consider the images to be classified as N , where n = 1, 2,…, N , and their respective weighted features are [ f ∧ 1, f ∧ 2,…, f ∧ N ]. The aim is to classify these images into two classes, that is, lesion benign and malignant, binary classification with the help of kernel function [ 37 , 38 ]. Consider the training data of the form D = {( x 1 , y 1 ),…, ( x m , y m )}, where m is the number of training samples, and associated output y i ∈ {+1, −1} as class label and the linear classification function as with v being a weighted vector and b a scalar bias value.…”
Section: Brain Tumor Detection Using Mri: Problem Definitionmentioning
confidence: 99%