IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Machine Learning and Data Mining; Methods and Applications
Machine Learning and Data Mining; Methods and Applications
Genetic Algorithms: Concepts and Designs with Disk
Genetic Algorithms: Concepts and Designs with Disk
TCP/IP Protocol Suite
Automated discovery of concise predictive rules for intrusion detection
Journal of Systems and Software
Building agents for rule-based intrusion detection system
Computer Communications
A comparison of methods for multiclass support vector machines
IEEE Transactions on Neural Networks
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Application of support vector machines on prediction of repeat visitation
CIMMACS'06 Proceedings of the 5th WSEAS International Conference on Computational Intelligence, Man-Machine Systems and Cybernetics
A new binary classifier: clustering-launched classification
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
Hi-index | 0.00 |
Host-based Intrusion Detection System (IDS) utilizes the log files as the data source and is limited by the content of the log files. If the log files were tampered, the IDS cannot accurately detect illegal behaviors. Therefore, the proposed IDS for this paper will create its own data source file. The system is controlled by the Client program and Server program. The client program is responsible for recording a user's behavior in the data source file. The data source file is then transmitted to the server program, which will send it to SVM to be analyzed. The analyzed result will then be transmitted back to the client program. The client program will then decide on the course of actions to take based on the analyzed result. Also, the genetic algorithm is used to optimize information to extract from the data source file so that detection time can be optimized.