Corpus ID: 52067128

Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System

@article{Masduki2018ImplementationAA,
  title={Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System},
  author={Bisyron Wahyudi Masduki and K. Ramli and H. Murfi},
  journal={Int. J. Commun. Networks Inf. Secur.},
  year={2018},
  volume={10}
}
  • Bisyron Wahyudi Masduki, K. Ramli, H. Murfi
  • Published 2018
  • Computer Science
  • Int. J. Commun. Networks Inf. Secur.
  • As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. There are many machine-learning methods that have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research we proposed an IDS that we developed based on… CONTINUE READING
    5 Citations
    Implementation of Ensemble Learning and Feature Selection for Performance Improvements in Anomaly-Based Intrusion Detection Systems
    • 3
    Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm Combined with Hopfield Neural Network
    • A. A. Obeidat
    • Computer Science
    • Int. J. Commun. Networks Inf. Secur.
    • 2020
    A Survey of Intrusion Detection Techniques
    • 1

    References

    SHOWING 1-10 OF 28 REFERENCES
    Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    • 256
    • PDF
    Anomaly based intrusion detection using filter based feature selection on KDD-CUP 99
    • 17
    A framework for constructing features and models for intrusion detection systems
    • 1,033
    • PDF
    A feature reduced intrusion detection system using ANN classifier
    • 96
    Survey on Incremental Approaches for Network Anomaly Detection
    • 43
    • PDF
    Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
    • 194
    • PDF