Hybrid Intelligent Intrusion Detection System

@inproceedings{Bashah2005HybridII,
  title={Hybrid Intelligent Intrusion Detection System},
  author={Norbik Bashah and Idris Bharanidharan Shanmugam and Abdul Manan Bin Ahmed},
  year={2005}
}
Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques that are being investigated includes neural networks and fuzzy logic with network profiling, that uses… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 34 CITATIONS

Experimental analysis of data mining application for intrusion detection with feature reduction

  • 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)
  • 2017
VIEW 1 EXCERPT
CITES METHODS

Distributed Network Intrusion Detection Systems: An Artificial Immune System Approach

  • 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

Model for cyber attacker behavioral analysis

  • 2015 IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI)
  • 2015
VIEW 1 EXCERPT

References

Publications referenced by this paper.
SHOWING 1-10 OF 14 REFERENCES

Host-based intrusion detection using self-organizing maps

P. Lichodzijewski, A. Nur Zincir-Heywood, M.I. Heywood
  • Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290)
  • 2002
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

The utilization of Artificial Intelligence in a Hybrid Intrusion Detection System”, SAICSIT

Botha.M, R Solms, K Perry, E Loubser, G Yamoyany
  • 2002
VIEW 1 EXCERPT

J.Gagnon and S.Jaiodia Integrating data mining techniques with intrusion detection methods

R. Mukkamala
  • Research Advances in Database and Information systems security,
  • 2000
VIEW 1 EXCERPT

and S . Jaiodia Integrating data mining techniques with intrusion detection methods

R. Mukkamala, J. Gagnon
  • Research Advances in Database and Information systems security
  • 2000

“ The Application of Neural Networks to UNIX Computer security ”

K Tan.
  • IEEE International conference on Neural Networks
  • 1995

Fast algorithms for mining association rules 20

R. Agrawal
  • R.Srikant
  • 1994
VIEW 3 EXCERPTS

Similar Papers

Loading similar papers…