Genetic programming: on the programming of computers by means of natural selection
Genetic programming: on the programming of computers by means of natural selection
Fuzzy set theory—and its applications (3rd ed.)
Fuzzy set theory—and its applications (3rd ed.)
Neuro-fuzzy and soft computing: a computational approach to learning and machine intelligence
Neuro-fuzzy and soft computing: a computational approach to learning and machine intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Intrusion detection using hierarchical neural networks
Pattern Recognition Letters
Using artificial anomalies to detect unknown and known network intrusions
Knowledge and Information Systems
Identifying Intrusions in Computer Networks with Principal Component Analysis
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
A clustering-based method for unsupervised intrusion detections
Pattern Recognition Letters
Decision tree classifier for network intrusion detection with GA-based feature selection
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 01
Neural Networks: A Comprehensive Foundation (3rd Edition)
Neural Networks: A Comprehensive Foundation (3rd Edition)
A latent class modeling approach to detect network intrusion
Computer Communications
Hybrid flexible neural-tree-based intrusion detection systems: Research Articles
International Journal of Intelligent Systems
A hierarchical SOM-based intrusion detection system
Engineering Applications of Artificial Intelligence
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A hybrid machine learning approach to network anomaly detection
Information Sciences: an International Journal
An empirical analysis of the probabilistic K-nearest neighbour classifier
Pattern Recognition Letters
A new intrusion detection system using support vector machines and hierarchical clustering
The VLDB Journal — The International Journal on Very Large Data Bases
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Computer Security: Principles and Practice
Computer Security: Principles and Practice
Expert Systems with Applications: An International Journal
Intrusion detection using PCASOM neural networks
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Intrusion detection through learning behavior model
Computer Communications
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
Assessing the severity of phishing attacks: A hybrid data mining approach
Decision Support Systems
AI based supervised classifiers: an analysis for intrusion detection
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Alert correlation in collaborative intelligent intrusion detection systems-A survey
Applied Soft Computing
Testing ensembles for intrusion detection: On the identification of mutated network scans
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
An information theoretic approach for feature selection
Security and Communication Networks
Proceedings of the 5th ACM workshop on Security and artificial intelligence
Comparison of Decision-Making Strategies for Self-Optimization in Autonomic Computing Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section: Extended Version of SASO 2011 Best Paper
A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection
Journal of Parallel and Distributed Computing
New class-dependent feature transformation for intrusion detection systems
Security and Communication Networks
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Information Sciences: an International Journal
Engineering Applications of Artificial Intelligence
A distance sum-based hybrid method for intrusion detection
Applied Intelligence
Hi-index | 12.05 |
The popularity of using Internet contains some risks of network attacks. Intrusion detection is one major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks. In literature, intrusion detection systems have been approached by various machine learning techniques. However, there is no a review paper to examine and understand the current status of using machine learning techniques to solve the intrusion detection problems. This chapter reviews 55 related studies in the period between 2000 and 2007 focusing on developing single, hybrid, and ensemble classifiers. Related studies are compared by their classifier design, datasets used, and other experimental setups. Current achievements and limitations in developing intrusion detection systems by machine learning are present and discussed. A number of future research directions are also provided.