Future paths for integer programming and links to artificial intelligence
Computers and Operations Research - Special issue: Applications of integer programming
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Algorithms for clustering data
Algorithms for clustering data
A simulated annealing algorithm for the clustering problem
Pattern Recognition
In search of optimal clusters using genetic algorithms
Pattern Recognition Letters
Mining in a data-flow environment: experience in network intrusion detection
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
ACM Computing Surveys (CSUR)
A dynamic tabu search for large-scale generalised assignment problems
Computers and Operations Research
A tabu-search based algorithm for the multicast-streams distribution problem
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anomaly Detection over Noisy Data using Learned Probability Distributions
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
A data mining framework for constructing features and models for intrusion detection systems (computer security, network security)
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
QoS-driven multicast tree generation using Tabu search
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
A tabu search approach for the minimum sum-of-squares clustering problem
Information Sciences: an International Journal
A comprehensive validity index for clustering
Intelligent Data Analysis
Hi-index | 0.00 |
Traditional methods of intrusion detection lack the extensibility in face of changing network configurations and the adaptability in face of unknown intrusion types. Meanwhile, current machine-learning algorithms for intrusion detection need labeled data to be trained, so they are expensive in computation and sometimes misled by artificial data. In order to solve these problems, a new detection algorithm is proposed in this paper, the Intrusion Detection Based on Tabu Clustering (IDBTC) algorithm. It can automatically set up clusters and detect intrusions by labeling normal and abnormal groups. Computer simulations show that this algorithm is effective for intrusion detection.