IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
A lattice model of secure information flow
Communications of the ACM
Instance Selection and Construction for Data Mining
Instance Selection and Construction for Data Mining
On Issues of Instance Selection
Data Mining and Knowledge Discovery
Practical Genetic Algorithms with CD-ROM
Practical Genetic Algorithms with CD-ROM
How to Solve It: Modern Heuristics
How to Solve It: Modern Heuristics
Fast condensed nearest neighbor rule
ICML '05 Proceedings of the 22nd international conference on Machine learning
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Computational Methods of Feature Selection (Chapman & Hall/Crc Data Mining and Knowledge Discovery Series)
Feature Extraction: Foundations and Applications (Studies in Fuzziness and Soft Computing)
Feature Extraction: Foundations and Applications (Studies in Fuzziness and Soft Computing)
Muiltiobjective optimization using nondominated sorting in genetic algorithms
Evolutionary Computation
A memetic algorithm for evolutionary prototype selection: A scaling up approach
Pattern Recognition
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A triangle area based nearest neighbors approach to intrusion detection
Pattern Recognition
Optimizing network anomaly detection scheme using instance selection mechanism
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Computational Intelligence Paradigms: Theory & Applications using MATLAB
Computational Intelligence Paradigms: Theory & Applications using MATLAB
NP-completeness of the problem of prototype selection in the nearest neighbor method
Pattern Recognition and Image Analysis
A multi-objective evolutionary algorithm for network intrusion detection systems
IWANN'11 Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part I
IDS false alarm filtering using KNN classifier
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A fast and elitist multiobjective genetic algorithm: NSGA-II
IEEE Transactions on Evolutionary Computation
A tutorial for competent memetic algorithms: model, taxonomy, and design issues
IEEE Transactions on Evolutionary Computation
Nearest neighbor pattern classification
IEEE Transactions on Information Theory
Hi-index | 0.00 |
A K-nearest neighbours-based intrusion detection system uses a training set for classification purpose. The size of this dataset is critical. In fact, if the dataset size is too small, the classification accuracy decreases. However if it is too large, the classification running time might be excessive. This paper describes an instance selection memetic algorithm used for the improvement of IDS classification. The proposed memetic controlled local search MCLS algorithm includes a new local search that allows the orientation and the improvement of the solutions. Besides, the proposed MCLS algorithm enhances the capabilities of the standard KNN classifier in intrusion detection field. The results obtained through experiments on KDD '99 dataset are very satisfactory as they enable the elimination of the false positive alerts while keeping a high detection rate.