IEEE Transactions on Software Engineering - Special issue on computer security and privacy
International Journal of Man-Machine Studies - Special Issue: Knowledge Acquisition for Knowledge-based Systems. Part 5
C4.5: programs for machine learning
C4.5: programs for machine learning
Metastrategy simulated annealing and tabu search algorithms for the vehicle routing problem
Annals of Operations Research - Special issue on Tabu search
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
BOAT—optimistic decision tree construction
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
An introduction to support Vector Machines: and other kernel-based learning methods
An introduction to support Vector Machines: and other kernel-based learning methods
Feature Selection for Knowledge Discovery and Data Mining
Feature Selection for Knowledge Discovery and Data Mining
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Machine Learning
Feature selection on hierarchy of web documents
Decision Support Systems - Web retrieval and mining
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Results of the KDD'99 classifier learning
ACM SIGKDD Explorations Newsletter
A neural network model with bounded-weights for pattern classification
Computers and Operations Research
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Post-pruning in decision tree induction using multiple performance measures
Computers and Operations Research
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
A hybrid machine learning approach to network anomaly detection
Information Sciences: an International Journal
Expert Systems with Applications: An International Journal
Artificial Intelligence in Medicine
Expert Systems with Applications: An International Journal
Applying hybrid meta-heuristics for capacitated vehicle routing problem
Expert Systems with Applications: An International Journal
The feature selection and intrusion detection problems
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A formal framework for positive and negative detection schemes
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
On combining support vector machines and simulated annealing in stereovision matching
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
An introduction to kernel-based learning algorithms
IEEE Transactions on Neural Networks
A novel intrusion detection system based on feature generation with visualization strategy
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Intrusion detection system (IDS) is to monitor the attacks occurring in the computer or networks. Anomaly intrusion detection plays an important role in IDS to detect new attacks by detecting any deviation from the normal profile. In this paper, an intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection is proposed. The key idea is to take the advantage of support vector machine (SVM), decision tree (DT), and simulated annealing (SA). In the proposed algorithm, SVM and SA can find the best selected features to elevate the accuracy of anomaly intrusion detection. By analyzing the information from using KDD'99 dataset, DT and SA can obtain decision rules for new attacks and can improve accuracy of classification. In addition, the best parameter settings for the DT and SVM are automatically adjusted by SA. The proposed algorithm outperforms other existing approaches. Simulation results demonstrate that the proposed algorithm is successful in detecting anomaly intrusion detection.