58
Views
0
CrossRef citations to date
0
Altmetric
Articles

A network attack discovery algorithm based on unbalanced sampling vehicle evolution strategy for intrusion detection

, &
Pages 84-92 | Received 10 Sep 2017, Accepted 15 Sep 2017, Published online: 10 Nov 2017

References

  • Ambusaidi M , He X , Nanda P , et al . Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput. 2016;65(10):2986–2998.10.1109/TC.2016.2519914
  • Bian J , Peng XG , Wang Y , et al . Data reduction strategy to intrusion detection of imbalanced sample data for subgroup discovery. Appl Res Comput. 2014;11(31):852–857.
  • Li Y , Guo L . An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers Secur. 2007;26(7–8):459–467.10.1016/j.cose.2007.10.002
  • Zhao Y , Chen J . Application of unbalanced data approach to network intrusion detection. first international workshop on database technology and applications. IEEE Comput Soc. 2009;2009:140–143.
  • Saxena DKK . Improve intrusion detection for decision tree with stratified sampling. Int J Electron Commun Comput Eng. 2011;48(2):171–176.
  • Tarik M , Singh A . Intrusion Detection System using K2 Self Learning. Comput Graphics Image Proc. 1981;16(4):382–394.
  • Zhao YA , Chen JJ , Xiao-Fang MU . Application of unbalanced data approach in high-speed network intrusion detection. J Comput Appl. 2009;29(7):140–143.
  • Khaing PTHKT . Important roles of data mining techniques for anomaly intrusion detection system. Int J Adv Res Comput Eng Tech. 2013;2(5):1741–1752.
  • Jiang SY , Song X , Wang H , et al . A clustering-based method for unsupervised intrusion detections. Pattern Recognit Lett. 2006;27(7):802–810.10.1016/j.patrec.2005.11.007
  • Kandeeban SS , Rajesh RS . A frame of intrusion detection learning system utilizing radial basis function. Int J Mod Educ Comput Sci. 2012;4(1):19–25.10.5815/ijmecs
  • Chawla NV , Japkowicz N , Kotcz A . Editorial: special issue on learning from imbalanced data sets. ACM SIGKDD Explor Newsl. 2004;6(1):1–6.10.1145/1007730
  • Agarwal R , Joshi MV . PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection). First Siam Conference on Data Mining. 2001;2001:357–366.
  • Bliss CA , Frank MR , Danforth CM , et al . An evolutionary algorithm approach to link prediction in dynamic social networks. J Comput Sci. 2014;5(5):750–764.10.1016/j.jocs.2014.01.003
  • Nandan M , Talathi SS , Myers S , et al . Support vector machines for seizure detection in an animal model of chronic epilepsy.. J Neural Eng. 2010;7(3):036001.10.1088/1741-2560/7/3/036001
  • Folleco AA , Khoshgoftaar TM , Van Hulse J , et al . Identifying learners robust to low quality data. Informatica. 2009;33(3):245–259.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.