IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Security audit trail analysis using inductively generated predictive rules
Proceedings of the sixth conference on Artificial intelligence applications
C4.5: programs for machine learning
C4.5: programs for machine learning
The nature of statistical learning theory
The nature of statistical learning theory
Classification and detection of computer intrusions
Classification and detection of computer intrusions
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
An introduction to intrusion detection
Crossroads - Special issue on computer security
Machine Learning
Neuro Fuzzy Systems: Sate-of-the-Art Modeling Techniques
IWANN '01 Proceedings of the 6th International Work-Conference on Artificial and Natural Neural Networks: Connectionist Models of Neurons, Learning Processes and Artificial Intelligence-Part I
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Intelligent systems: architectures and perspectives
Recent advances in intelligent paradigms and applications
A data mining framework for constructing features and models for intrusion detection systems (computer security, network security)
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Modeling intrusion detection systems using linear genetic programming approach
IEA/AIE'2004 Proceedings of the 17th international conference on Innovations in applied artificial intelligence
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A formal framework for positive and negative detection schemes
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Predicting object-oriented software maintainability using multivariate adaptive regression splines
Journal of Systems and Software
Hierarchical two-tier ensemble learning: a new paradigm for network intrusion detection
Proceedings of the ACM first Ph.D. workshop in CIKM
Diversity of ability and cognitive style for group decision processes
Information Sciences: an International Journal
Enhancing network based intrusion detection for imbalanced data
International Journal of Knowledge-based and Intelligent Engineering Systems
A triangle area based nearest neighbors approach to intrusion detection
Pattern Recognition
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Detecting Network Anomalies Using CUSUM and EM Clustering
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
An efficient network intrusion detection
Computer Communications
Distributed architecture for intrusion detection system based on multi-softman
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hybrid computational models for the characterization of oil and gas reservoirs
Expert Systems with Applications: An International Journal
An ensemble-based evolutionary framework for coping with distributed intrusion detection
Genetic Programming and Evolvable Machines
An effective intrusion detection method using optimal hybrid model of classifiers
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
Incremental SVM based on reserved set for network intrusion detection
Expert Systems with Applications: An International Journal
Exploring discrepancies in findings obtained with the KDD Cup '99 data set
Intelligent Data Analysis
Virtual machine monitor-based lightweight intrusion detection
ACM SIGOPS Operating Systems Review
Online internet intrusion detection based on flow statistical characteristics
KSEM'11 Proceedings of the 5th international conference on Knowledge Science, Engineering and Management
Towards a multiagent-based distributed intrusion detection system using data mining approaches
ADMI'11 Proceedings of the 7th international conference on Agents and Data Mining Interaction
Financial distress prediction using support vector machines: Ensemble vs. individual
Applied Soft Computing
Network intrusion detection system: a machine learning approach
Intelligent Decision Technologies
Policy-enhanced ANFIS model to counter SOAP-related attacks
Knowledge-Based Systems
Securing cloud storage systems through a virtual machine monitor
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
The use of artificial-intelligence-based ensembles for intrusion detection: a review
Applied Computational Intelligence and Soft Computing
Journal of Network and Computer Applications
Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference
D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks
Proceedings of the 6th International Conference on Security of Information and Networks
A survey of multiple classifier systems as hybrid systems
Information Fusion
Advanced Engineering Informatics
Hi-index | 0.01 |
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper presents two hybrid approaches for modeling IDS. Decision trees (DT) and support vector machines (SVM) are combined as a hierarchical hybrid intelligent system model (DT-SVM) and an ensemble approach combining the base classifiers. The hybrid intrusion detection model combines the individual base classifiers and other hybrid machine learning paradigms to maximize detection accuracy and minimize computational complexity. Empirical results illustrate that the proposed hybrid systems provide more accurate intrusion detection systems.