Intrusion Detection System Using Modified Support Vector Machine
Abstract
Keywords
Full Text:
PDFReferences
Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. "EAACK—a secure intrusion-detection system for MANETs." Industrial Electronics, IEEE Transactions on 60, no. 3 (2013): 1089-1098.
Hoque, Mohammad Sazzadul, Md Mukit, Md Bikas, and Abu Naser. "An implementation of intrusion detection system using genetic algorithm." arXiv preprint arXiv:1204.1336 (2012).
Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.
Dhage, Sudhir N., and B. B. Meshram. "Intrusion detection system in cloud computing environment." International Journal of Cloud Computing 1, no. 2-3 (2012): 261-282.
Li, Yinhui, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, and Kuobin Dai. "An efficient intrusion detection system based on support vector machines and gradually feature removal method." Expert Systems with Applications 39, no. 1 (2012): 424-430.
Koc, Levent, Thomas A. Mazzuchi, and Shahram Sarkani. "A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier." Expert Systems with Applications 39, no. 18 (2012): 13492-13500.
Om, Hari, and Aritra Kundu. "A hybrid system for reducing the false alarm rate of anomaly intrusion detection system." In Recent Advances in Information Technology (RAIT), 2012 1st International Conference on, pp. 131-136. IEEE, 2012.
Trivedi, Animesh Kr, Rishi Kapoor, Rajan Arora, Sudip Sanyal, and Sugata Sanyal. "RISM--Reputation Based Intrusion Detection System for Mobile Ad hoc Networks." arXiv preprint arXiv:1307.7833 (2013).
Shelke, Ms Parag K., Ms Sneha Sontakke, and A. D. Gawande. "Intrusion detection system for cloud computing." International Journal of Scientific & Technology Research 1, no. 4 (2012): 67-71.
Jha, Jayshree, and Leena Ragha. "Intrusion Detection System using Support Vector Machine." International Journal of Applied Information Systems (HAIS)-ISSN: (2013) 2249-0868.
Modi, Chirag, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan. "A survey of intrusion detection techniques in cloud." Journal of Network and Computer Applications 36, no. 1 (2013): 42-57.
Zhang, Mohua, and Ge Li. "Network intrusion detection based on least squares support vector machine and chaos particle swarm optimization algorithm." Journal of Convergence Information Technology 7, no. 4 (2012).
Bhavsar, Yogita B., and Kalyani C. Waghmare. "Intrusion Detection System Using Data Mining Technique: Support Vector Machine." International Journal of Emerging Technology and Advanced Engineering 3, no. 3 (2013): 581-586.
Satpute, Khushboo, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma. "A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques." InProceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 441-452. Springer Berlin Heidelberg, 2013.
Zhang, Zonghua, and Hong Shen. "Online training of svms for realtime intrusion detection based on improved text categorization model." Computer Communications 28, no. 12 (2005): 1428-1443.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.