IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Introduction to the theory of neural computation
Introduction to the theory of neural computation
The nature of statistical learning theory
The nature of statistical learning theory
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Neural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
USTAT: A Real-Time Intrusion Detection System for UNIX
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Lightweight agents for intrusion detection
Journal of Systems and Software
Weather analysis using ensemble of connectionist learning paradigms
Applied Soft Computing
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Using genetic feature selection for improving cyber attack detection rate
ACST'07 Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology
Diversity of ability and cognitive style for group decision processes
Information Sciences: an International Journal
Improving malware detection by applying multi-inducer ensemble
Computational Statistics & Data Analysis
Semi-supervised co-training and active learning based approach for multi-view intrusion detection
Proceedings of the 2009 ACM symposium on Applied Computing
A triangle area based nearest neighbors approach to intrusion detection
Pattern Recognition
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
An efficient network intrusion detection
Computer Communications
An intrusion detection based on support vector machines with a voting weight schema
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
Combining heterogeneous classifiers for network intrusion detection
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Feature selection using rough-DPSO in anomaly intrusion detection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Anomaly intrusion detection for evolving data stream based on semi-supervised learning
ICONIP'08 Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I
Random effects logistic regression model for anomaly detection
Expert Systems with Applications: An International Journal
An effective intrusion detection method using optimal hybrid model of classifiers
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
Network intrusion detection based on system calls and data mining
Frontiers of Computer Science in China
Expert Systems with Applications: An International Journal
Detection of TCP attacks using SOM with fast nearest-neighbor search
NN'05 Proceedings of the 6th WSEAS international conference on Neural networks
Mutual information-based feature selection for intrusion detection systems
Journal of Network and Computer Applications
Approach based ensemble methods for better and faster intrusion detection
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Empirical study on fusion methods using ensemble of RBFNN for network intrusion detection
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
CBRid4SQL: a CBR intrusion detector for SQL injection attacks
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
ICAISC'06 Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing
Using attack-specific feature subsets for network intrusion detection
AI'06 Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
Applied Soft Computing
Anomaly based intrusion detection using meta ensemble classifier
Proceedings of the Fifth International Conference on Security of Information and Networks
Extreme learning machines for intrusion detection systems
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part IV
The use of artificial-intelligence-based ensembles for intrusion detection: a review
Applied Computational Intelligence and Soft Computing
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
Information Sciences: an International Journal
Hi-index | 0.01 |
Soft computing techniques are increasingly being used for problem solving. This paper addresses using an ensemble approach of different soft computing and hard computing techniques for intrusion detection. Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. We studied the performance of Artificial Neural Networks (ANNs), Support Vector Machines (SVMs) and Multivariate Adaptive Regression Splines (MARS). We show that an ensemble of ANNs, SVMs and MARS is superior to individual approaches for intrusion detection in terms of classification accuracy.