An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine
Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many machine learning based intrusion detection techniques. However, the benefits and limitations of these techniques make the development of an e...
Saved in:
Published in | Knowledge-based systems Vol. 134; pp. 1 - 12 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier B.V
15.10.2017
Elsevier Science Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many machine learning based intrusion detection techniques. However, the benefits and limitations of these techniques make the development of an efficient Intrusion Detection System (IDS), an open challenge. This paper presents an adaptive, and a robust intrusion detection technique using Hypergraph based Genetic Algorithm (HG - GA) for parameter setting and feature selection in Support Vector Machine (SVM). Hyper – clique property of Hypergraph was exploited for the generation of initial population to fasten the search for the optimal solution and to prevent the trap at the local minima. HG-GA uses a weighted objective function to maintain the trade-off between maximizing the detection rate and minimizing the false alarm rate, along with the optimal number of features. The performance of HG-GA SVM was evaluated using NSL-KDD intrusion dataset under two scenarios (i) All features and (ii) informative features obtained from HG – GA. Experimental results show the prominence of HG-GA SVM over the existing techniques in terms of classifier accuracy, detection rate, false alarm rate, and runtime analysis. |
---|---|
AbstractList | Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many machine learning based intrusion detection techniques. However, the benefits and limitations of these techniques make the development of an efficient Intrusion Detection System (IDS), an open challenge. This paper presents an adaptive, and a robust intrusion detection technique using Hypergraph based Genetic Algorithm (HG-GA) for parameter setting and feature selection in Support Vector Machine (SVM). Hyper-clique property of Hypergraph was exploited for the generation of initial population to fasten the search for the optimal solution and to prevent the trap at the local minima. HG-GA uses a weighted objective function to maintain the trade-off between maximizing the detection rate and minimizing the false alarm rate, along with the optimal number of features. The performance of HG-GA SVM was evaluated using NSL-KDD intrusion dataset under two scenarios (i) All features and (ii) informative features obtained from HG-GA. Experimental results show the prominence of HG-GA SVM over the existing techniques in terms of classifier accuracy, detection rate, false alarm rate, and runtime analysis. |
Author | Gauthama Raman, M.R. Kirthivasan, Kannan Somu, Nivethitha Liscano, Ramiro Shankar Sriram, V.S. |
Author_xml | – sequence: 1 givenname: M.R. surname: Gauthama Raman fullname: Gauthama Raman, M.R. email: gauthamaraman_mr@sastra.ac.in organization: Centre for Information Super Highway (CISH), School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India – sequence: 2 givenname: Nivethitha surname: Somu fullname: Somu, Nivethitha email: nivethitha@sastra.ac.in organization: Centre for Information Super Highway (CISH), School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India – sequence: 3 givenname: Kannan surname: Kirthivasan fullname: Kirthivasan, Kannan email: kkannan@maths.sastra.edu organization: Discrete Mathematics Research Laboratory (DMRL), Department of Mathematics, SASTRA University, Thanjavur, Tamil Nadu, India – sequence: 4 givenname: Ramiro surname: Liscano fullname: Liscano, Ramiro email: ramiro.liscano@uoit.ca organization: Department of Electrical, Computer and Software Engineering, University of Ontario Institute of Technology, Oshawa, Ontario, Canada – sequence: 5 givenname: V.S. surname: Shankar Sriram fullname: Shankar Sriram, V.S. email: sriram@it.sastra.edu organization: Centre for Information Super Highway (CISH), School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India |
BookMark | eNp9kcFq3DAQhkVJIJs0b5CDoGdvR7Zkry-FENq0EOilPQtZHmW1XUvuSA5sH6VPG7mbc2FAmmHmG_75r9lFiAEZuxOwFSDaj4ftrxDTKW1rEN0WSoB6xzZi19VVJ6G_YBvoFVQdKHHFrlM6AEBdi92G_b0PHJ3z1mPI3IdMS_Ix8BEz2rz-CjfjxAeTcOQl359mpGcy855X_BEDZm-5OT5H8nk_cReJz4bMVADE45z95P-YfyQTRu7Q5IWQJzy-8X1ZscxzpMxfSqmMT8bufcD37NKZY8Lbt_eG_fzy-cfD1-rp--O3h_unyjaNzJUxVhTdrex7KxvrWlFbGPudagGxbpRspQNnB-kGwHow7dg0vUE5qsGA6lRzwz6cuTPF3wumrA9xoVBWatG37U6JphalS567LMWUCJ2eyU-GTlqAXl3QB312Qa8uaCgBK_zTeQyLghePpNN6aoujp6JWj9H_H_AKL9eYpg |
CitedBy_id | crossref_primary_10_12720_jait_15_1_147_154 crossref_primary_10_1007_s00521_023_08511_2 crossref_primary_10_1016_j_jbusres_2021_04_038 crossref_primary_10_1109_ACCESS_2021_3075066 crossref_primary_10_1016_j_neunet_2018_08_005 crossref_primary_10_1016_j_orp_2023_100279 crossref_primary_10_1088_1757_899X_1022_1_012036 crossref_primary_10_1007_s00607_022_01059_4 crossref_primary_10_1088_1742_6596_1601_3_032048 crossref_primary_10_1007_s00521_021_06093_5 crossref_primary_10_1016_j_compeleceng_2022_108383 crossref_primary_10_1016_j_comnet_2020_107183 crossref_primary_10_1016_j_knosys_2023_110421 crossref_primary_10_3934_mbe_2021208 crossref_primary_10_1016_j_cor_2022_106131 crossref_primary_10_1016_j_future_2018_04_033 crossref_primary_10_1007_s00500_018_03753_y crossref_primary_10_1038_s41598_023_36304_z crossref_primary_10_1007_s11277_022_10063_y crossref_primary_10_21595_jve_2019_20207 crossref_primary_10_1007_s00521_019_04236_3 crossref_primary_10_1016_j_micpro_2022_104752 crossref_primary_10_1109_TIA_2020_2977872 crossref_primary_10_1007_s10586_017_1643_4 crossref_primary_10_1016_j_eswa_2022_119189 crossref_primary_10_1007_s00521_022_07203_7 crossref_primary_10_1007_s11277_021_08368_5 crossref_primary_10_29121_granthaalayah_v8_i8_2020_1031 crossref_primary_10_1016_j_heliyon_2023_e13633 crossref_primary_10_1016_j_comnet_2018_11_010 crossref_primary_10_1016_j_net_2020_05_012 crossref_primary_10_3390_s22010140 crossref_primary_10_1007_s10462_022_10328_9 crossref_primary_10_1007_s40747_023_01313_y crossref_primary_10_1007_s10462_019_09762_z crossref_primary_10_1016_j_rineng_2022_100542 crossref_primary_10_1155_2022_7799769 crossref_primary_10_1007_s10044_021_00985_x crossref_primary_10_1007_s12530_021_09393_2 crossref_primary_10_1016_j_eswa_2022_118120 crossref_primary_10_1007_s11416_022_00431_4 crossref_primary_10_1016_j_knosys_2020_106456 crossref_primary_10_3390_math10244745 crossref_primary_10_17482_uumfd_747078 crossref_primary_10_3233_JIFS_232532 crossref_primary_10_1016_j_jnca_2021_102983 crossref_primary_10_1109_COMST_2019_2922584 crossref_primary_10_1155_2024_3909173 crossref_primary_10_3390_electronics12051260 crossref_primary_10_1007_s00521_019_04655_2 crossref_primary_10_1016_j_knosys_2020_106602 crossref_primary_10_1007_s10462_021_10037_9 crossref_primary_10_1080_0952813X_2021_1960627 crossref_primary_10_1016_j_comnet_2020_107417 crossref_primary_10_1016_j_eij_2022_06_005 crossref_primary_10_1155_2022_6473507 crossref_primary_10_1109_ACCESS_2020_3029202 crossref_primary_10_1007_s11416_021_00410_1 crossref_primary_10_1016_j_asoc_2019_105945 crossref_primary_10_1155_2022_6131463 crossref_primary_10_1007_s00500_021_05809_y crossref_primary_10_1007_s11277_019_06972_0 crossref_primary_10_1155_2022_2215852 crossref_primary_10_1109_ACCESS_2021_3109081 crossref_primary_10_1016_j_future_2021_02_001 crossref_primary_10_1109_ACCESS_2018_2841987 crossref_primary_10_3390_s22062100 crossref_primary_10_1016_j_cose_2020_102055 crossref_primary_10_1016_j_eswa_2021_115620 crossref_primary_10_3390_su131910743 crossref_primary_10_1080_0952813X_2019_1647558 crossref_primary_10_3390_electronics10121375 crossref_primary_10_1142_S1469026820500169 crossref_primary_10_1016_j_apenergy_2019_114131 crossref_primary_10_1139_cjfr_2021_0265 crossref_primary_10_1111_coin_12497 crossref_primary_10_1016_j_comnet_2018_02_028 crossref_primary_10_1109_ACCESS_2019_2922692 crossref_primary_10_3390_s22052018 crossref_primary_10_1002_cpe_7134 crossref_primary_10_1016_j_iot_2022_100615 crossref_primary_10_1088_1757_899X_563_5_052019 crossref_primary_10_1002_dac_4434 crossref_primary_10_1088_1755_1315_428_1_012011 crossref_primary_10_3390_app10093227 crossref_primary_10_1016_j_eswa_2022_119301 crossref_primary_10_1016_j_knosys_2022_108640 crossref_primary_10_1007_s00366_021_01369_9 crossref_primary_10_1016_j_eswa_2022_117485 crossref_primary_10_1016_j_knosys_2020_105650 crossref_primary_10_1016_j_knosys_2020_105648 crossref_primary_10_1007_s13369_019_04178_x crossref_primary_10_1016_j_knosys_2020_106614 crossref_primary_10_1155_2022_4685754 crossref_primary_10_1016_j_swevo_2019_100618 crossref_primary_10_32604_iasc_2023_028650 crossref_primary_10_1016_j_swevo_2019_100631 crossref_primary_10_1007_s10489_019_01503_7 crossref_primary_10_1007_s11633_022_1367_7 crossref_primary_10_1007_s11227_024_06235_1 crossref_primary_10_1002_tee_22987 crossref_primary_10_1016_j_eswa_2018_04_038 crossref_primary_10_1016_j_ijcip_2021_100449 crossref_primary_10_1002_spy2_429 crossref_primary_10_1016_j_knosys_2021_107221 crossref_primary_10_1155_2020_5287684 crossref_primary_10_1007_s11277_021_09393_0 crossref_primary_10_1016_j_eswa_2019_112845 crossref_primary_10_1016_j_eswa_2022_116545 crossref_primary_10_1155_2019_7130868 crossref_primary_10_1016_j_eswa_2022_116822 crossref_primary_10_1016_j_asoc_2023_110412 crossref_primary_10_3390_a12010022 crossref_primary_10_1186_s42400_021_00095_5 crossref_primary_10_1002_ett_4798 crossref_primary_10_1016_j_asoc_2020_107038 crossref_primary_10_3390_s22041396 crossref_primary_10_1007_s11047_022_09912_3 crossref_primary_10_1007_s40747_021_00498_4 crossref_primary_10_32604_cmc_2022_018708 crossref_primary_10_1016_j_ijcip_2020_100393 crossref_primary_10_1515_jisys_2022_0059 crossref_primary_10_1155_2022_7898871 crossref_primary_10_4018_IJISMD_315024 crossref_primary_10_1109_ACCESS_2023_3251354 crossref_primary_10_1016_j_knosys_2022_109795 crossref_primary_10_1007_s00521_020_04701_4 crossref_primary_10_1063_5_0155459 crossref_primary_10_32604_cmc_2021_014172 crossref_primary_10_1016_j_jksuci_2018_03_011 crossref_primary_10_1007_s00500_019_03818_6 crossref_primary_10_3390_systems10040108 crossref_primary_10_1016_j_cose_2019_05_022 crossref_primary_10_1007_s12652_020_01919_x crossref_primary_10_32604_cmc_2023_033273 crossref_primary_10_3233_JIFS_169960 |
Cites_doi | 10.1016/j.neucom.2004.11.022 10.1016/j.asoc.2014.01.028 10.1109/TFUZZ.2010.2087382 10.1155/2015/365869 10.1016/j.eswa.2009.05.029 10.1016/j.eswa.2015.07.015 10.1016/j.chemolab.2014.12.007 10.1016/j.knosys.2012.09.004 10.14429/dsj.66.10802 10.3390/e17041795 10.1016/j.cose.2011.08.009 10.1016/j.eswa.2010.10.041 10.1186/s40064-015-1523-4 10.1016/j.eswa.2005.09.024 10.1016/j.imavis.2010.01.013 10.1109/TGRS.2004.831865 10.1007/s10916-016-0600-8 10.1016/j.asoc.2012.04.020 10.1016/j.patcog.2006.12.009 10.1016/j.bspc.2015.05.014 10.1016/j.amc.2014.04.039 10.1016/j.knosys.2017.01.013 10.1145/1961189.1961199 10.1016/j.asoc.2007.10.007 10.1145/1380422.1380425 10.3390/en5114430 10.1016/j.mcm.2011.06.048 10.1016/j.neucom.2016.03.031 10.1007/s11227-017-2032-8 10.1016/j.eswa.2007.08.088 10.1016/j.knosys.2016.01.002 |
ContentType | Journal Article |
Copyright | 2017 Copyright Elsevier Science Ltd. Oct 15, 2017 |
Copyright_xml | – notice: 2017 – notice: Copyright Elsevier Science Ltd. Oct 15, 2017 |
DBID | AAYXX CITATION 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
DOI | 10.1016/j.knosys.2017.07.005 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-7409 |
EndPage | 12 |
ExternalDocumentID | 10_1016_j_knosys_2017_07_005 S0950705117303209 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 77K 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABAOU ABBOA ABIVO ABJNI ABMAC ABYKQ ACAZW ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADGUI ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ARUGR AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W JJJVA KOM LG9 LY7 M41 MHUIS MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 RIG ROL RPZ SDF SDG SDP SES SPC SPCBC SST SSV SSW SSZ T5K WH7 XPP ZMT ~02 ~G- 29L AAQXK AAXKI AAYXX ABXDB ACNNM ADJOM ADMUD AFJKZ AKRWK ASPBG AVWKF AZFZN CITATION FEDTE FGOYB G-2 G8K HLZ HVGLF HZ~ R2- SBC SET SEW UHS WUQ 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c334t-aac12016499c43cf612c0d98560ee235464f0fcb4fb0e2ba6d339ae4d5ba05753 |
IEDL.DBID | AIKHN |
ISSN | 0950-7051 |
IngestDate | Thu Oct 10 14:51:40 EDT 2024 Thu Sep 26 16:18:10 EDT 2024 Fri Feb 23 02:28:20 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Hypergraph Support vector machine Genetic algorithm Intrusion detection system Kernel parameters Feature subset |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c334t-aac12016499c43cf612c0d98560ee235464f0fcb4fb0e2ba6d339ae4d5ba05753 |
PQID | 1966851321 |
PQPubID | 2035257 |
PageCount | 12 |
ParticipantIDs | proquest_journals_1966851321 crossref_primary_10_1016_j_knosys_2017_07_005 elsevier_sciencedirect_doi_10_1016_j_knosys_2017_07_005 |
PublicationCentury | 2000 |
PublicationDate | 2017-10-15 |
PublicationDateYYYYMMDD | 2017-10-15 |
PublicationDate_xml | – month: 10 year: 2017 text: 2017-10-15 day: 15 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Knowledge-based systems |
PublicationYear | 2017 |
Publisher | Elsevier B.V Elsevier Science Ltd |
Publisher_xml | – name: Elsevier B.V – name: Elsevier Science Ltd |
References | Nivethitha, Kannan, Shankar Sriram (bib0035) 2016 Tsang, Kwong (bib0053) 2006 Gan, Duanmu, Wang, Cong (bib0014) 2013; 40 Somu, Kirthivasan, Sriram (bib0037) 2017 Lin, Huang, Hung, Lin (bib0023) 2015 ling Chen, Yang, jing Wang, Wang, you Liu, zhong Li, bin Liu (bib0019) 2014; 239 Zhang, Dong, Wang, Ji, Yang (bib0028) 2015; 17 Tsai, Hsu, Lin, Lin (bib0001) 2009; 36 de la Hoz, Ortiz, Ortega, de la Hoz (bib0045) 2013 Wang, Liu (bib0016) 2015; 141 Berge, Minieka (bib0039) 1973 Zhang, Wang, Phillips, Dong, Ji, Yang (bib0027) 2015; 21 Walters (bib0003) 2014; 4289 Kayacik, Zincir-Heywood (bib0047) 2007 Chang, Lin (bib0042) 2011; 2 Yang, Zhang, Lu, Ma (bib0011) 2011; 19 Kuang, Xu, Zhang (bib0008) 2014; 18 Kannan, Kanna, Aravindan (bib0032) 2010 Ma, Liu, Liu (bib0052) 2008 Raman, Kannan, Pal (bib0033) 2016 Huang, Dun (bib0018) 2008; 8 Singh, Kumar, Singla (bib0044) 2015; 42 Kshirsagar, Patil (bib0049) 2010; 4 Tavallaee, Bagheri, Lu, Ghorbani (bib0051) 2009 Danchev (bib0005) 2008; 18 Hosseini Bamakan, Wang, Yingjie, Shi (bib0020) 2016; 199 Scarfone, Mell (bib0006) 2007 Traynor (bib0004) 2007; 17 NSL-KDD Data Set, [Online]. Available:http://www.unb.ca/cic/research/datasets/nsl.html, (n.d.). Melgani, Bruzzone (bib0029) 2004 Friedrichs, Igel (bib0017) 2005; 64 Sarafrazi, Nezamabadi-pour (bib0022) 2013; 57 Yu, Tsai, Weigert (bib0056) 2008; 3 Zhang, Wang, Yang, Dong, Liu, Phillips, Yuan (bib0026) 2015; 4 Panda, Abraham, Patra (bib0048) 2010 Chung, Wahid (bib0002) 2012; 12 Huang, Zhu, Yang, Cheng, Wu (bib0009) 2017; 121 Shen, Chen, Yu, Kang, Zhang, Li, Yang, Liu (bib0013) 2016; 96 Tsang, Kwong, Wang (bib0046) 2007; 40 Abadeh, Habibi (bib0057) 2010; 2 Gauthama Raman, Kirthivasan, Shankar Sriram (bib0034) 2017; 0 Kolias, Kambourakis, Maragoudakis (bib0007) 2011; 30 Davis (bib0031) 1991 Huang, Wang (bib0021) 2006; 31 Gauthama Raman, Somu, Kirthivasan, Sriram (bib0010) 2017 Christiannini, Shawe-Taylor (bib0030) 2000 Tavallaee, Bagheri, Lu (bib0041) 2009 Zhao, Fu, Ji, Tang, Zhou (bib0024) 2011; 38 Li, Guo, Zhao, Su, Wang (bib0015) 2012; 5 Chen, Lin, Tang, Xia, Chen, Lin, Tang, Xia (bib0025) 2016; 2016 Somu, Raman, Kirthivasan, Sriram (bib0038) 2016; 40 Lin, Ying, Chen, Lee (bib0012) 2008; 35 Witten (bib0043) 2016 Wang (10.1016/j.knosys.2017.07.005_bib0016) 2015; 141 Tavallaee (10.1016/j.knosys.2017.07.005_bib0041) 2009 Tavallaee (10.1016/j.knosys.2017.07.005_bib0051) 2009 Melgani (10.1016/j.knosys.2017.07.005_bib0029) 2004 Kshirsagar (10.1016/j.knosys.2017.07.005_bib0049) 2010; 4 Ma (10.1016/j.knosys.2017.07.005_bib0052) 2008 Zhang (10.1016/j.knosys.2017.07.005_bib0027) 2015; 21 Scarfone (10.1016/j.knosys.2017.07.005_bib0006) 2007 Gauthama Raman (10.1016/j.knosys.2017.07.005_bib0034) 2017; 0 Huang (10.1016/j.knosys.2017.07.005_bib0018) 2008; 8 Hosseini Bamakan (10.1016/j.knosys.2017.07.005_bib0020) 2016; 199 Tsai (10.1016/j.knosys.2017.07.005_bib0001) 2009; 36 Zhao (10.1016/j.knosys.2017.07.005_bib0024) 2011; 38 Kannan (10.1016/j.knosys.2017.07.005_bib0032) 2010 Somu (10.1016/j.knosys.2017.07.005_bib0038) 2016; 40 Gan (10.1016/j.knosys.2017.07.005_bib0014) 2013; 40 Nivethitha (10.1016/j.knosys.2017.07.005_bib0035) 2016 Tsang (10.1016/j.knosys.2017.07.005_bib0053) 2006 Berge (10.1016/j.knosys.2017.07.005_bib0039) 1973 ling Chen (10.1016/j.knosys.2017.07.005_bib0019) 2014; 239 Raman (10.1016/j.knosys.2017.07.005_bib0033) 2016 Lin (10.1016/j.knosys.2017.07.005_bib0012) 2008; 35 10.1016/j.knosys.2017.07.005_bib0040 Davis (10.1016/j.knosys.2017.07.005_bib0031) 1991 Walters (10.1016/j.knosys.2017.07.005_bib0003) 2014; 4289 Witten (10.1016/j.knosys.2017.07.005_bib0043) 2016 Huang (10.1016/j.knosys.2017.07.005_bib0009) 2017; 121 Lin (10.1016/j.knosys.2017.07.005_bib0023) 2015 Yu (10.1016/j.knosys.2017.07.005_bib0056) 2008; 3 de la Hoz (10.1016/j.knosys.2017.07.005_bib0045) 2013 Kolias (10.1016/j.knosys.2017.07.005_bib0007) 2011; 30 Somu (10.1016/j.knosys.2017.07.005_bib0037) 2017 Abadeh (10.1016/j.knosys.2017.07.005_bib0057) 2010; 2 Yang (10.1016/j.knosys.2017.07.005_bib0011) 2011; 19 Kuang (10.1016/j.knosys.2017.07.005_bib0008) 2014; 18 Danchev (10.1016/j.knosys.2017.07.005_bib0005) 2008; 18 Chung (10.1016/j.knosys.2017.07.005_bib0002) 2012; 12 Li (10.1016/j.knosys.2017.07.005_bib0015) 2012; 5 Zhang (10.1016/j.knosys.2017.07.005_bib0026) 2015; 4 Chang (10.1016/j.knosys.2017.07.005_bib0042) 2011; 2 Traynor (10.1016/j.knosys.2017.07.005_bib0004) 2007; 17 Tsang (10.1016/j.knosys.2017.07.005_bib0046) 2007; 40 Singh (10.1016/j.knosys.2017.07.005_bib0044) 2015; 42 Friedrichs (10.1016/j.knosys.2017.07.005_bib0017) 2005; 64 Huang (10.1016/j.knosys.2017.07.005_bib0021) 2006; 31 Chen (10.1016/j.knosys.2017.07.005_bib0025) 2016; 2016 Gauthama Raman (10.1016/j.knosys.2017.07.005_bib0010) 2017 Christiannini (10.1016/j.knosys.2017.07.005_bib0030) 2000 Kayacik (10.1016/j.knosys.2017.07.005_bib0047) 2007 Shen (10.1016/j.knosys.2017.07.005_bib0013) 2016; 96 Sarafrazi (10.1016/j.knosys.2017.07.005_bib0022) 2013; 57 Panda (10.1016/j.knosys.2017.07.005_bib0048) 2010 Zhang (10.1016/j.knosys.2017.07.005_bib0028) 2015; 17 |
References_xml | – volume: 0 start-page: 1 year: 2017 end-page: 12 ident: bib0034 article-title: Development of rough set – hypergraph technique for key feature identification in intrusion detection systems publication-title: Comput. Electr. Eng. contributor: fullname: Shankar Sriram – year: 2016 ident: bib0035 article-title: A computational model for ranking cloud service providers using hypergraph based techniques publication-title: Futur. Gener. Comput. Syst contributor: fullname: Shankar Sriram – volume: 3 start-page: 1 year: 2008 end-page: 25 ident: bib0056 article-title: An adaptive automatically tuning intrusion detection system publication-title: ACM Trans. Auton. Adapt. Syst. contributor: fullname: Weigert – volume: 30 start-page: 625 year: 2011 end-page: 642 ident: bib0007 article-title: Swarm intelligence in intrusion detection: a survey publication-title: Comput. Secur. contributor: fullname: Maragoudakis – year: 2007 ident: bib0006 article-title: Guide to Intrusion Detection and Prevention Systems (IDPS) contributor: fullname: Mell – volume: 12 start-page: 3014 year: 2012 end-page: 3022 ident: bib0002 article-title: A hybrid network intrusion detection system using simplified swarm optimization (SSO) publication-title: Appl. Soft Comput. contributor: fullname: Wahid – volume: 141 start-page: 79 year: 2015 end-page: 87 ident: bib0016 article-title: Melt index prediction by least squares support vector machines with an adaptive mutation fruit fly optimization algorithm publication-title: Chemom. Intell. Lab. Syst. contributor: fullname: Liu – volume: 5 start-page: 4430 year: 2012 end-page: 4445 ident: bib0015 article-title: Annual electric load forecasting by a least squares support vector machine with a fruit fly optimization algorithm publication-title: Energies contributor: fullname: Wang – year: 2010 ident: bib0032 article-title: Root mean square filter for noisy images based on hyper graph model publication-title: Image Vis. Comput. contributor: fullname: Aravindan – volume: 2016 start-page: 1 year: 2016 end-page: 10 ident: bib0025 article-title: A parallel genetic algorithm based feature selection and parameter optimization for support vector machine publication-title: Sci. Program. contributor: fullname: Xia – year: 2017 ident: bib0037 article-title: A rough set-based hypergraph trust measure parameter selection technique for cloud service selection publication-title: J. Supercomput. contributor: fullname: Sriram – volume: 57 start-page: 270 year: 2013 end-page: 278 ident: bib0022 article-title: Facing the classification of binary problems with a GSA-SVM hybrid system publication-title: Math. Comput. Model. contributor: fullname: Nezamabadi-pour – year: 2016 ident: bib0043 article-title: Data Mining: Practical machine learning tools and techniques publication-title: Morgan Kaufmann contributor: fullname: Witten – volume: 38 start-page: 5197 year: 2011 end-page: 5204 ident: bib0024 article-title: Feature selection and parameter optimization for support vector machines: a new approach based on genetic algorithm with feature chromosomes publication-title: Expert Syst. Appl. contributor: fullname: Zhou – volume: 18 start-page: 2015 year: 2008 ident: bib0005 article-title: Georgia President’s Web Site under DDoS Attack from Russian Hackers publication-title: Cit. dne contributor: fullname: Danchev – volume: 31 start-page: 231 year: 2006 end-page: 240 ident: bib0021 article-title: A GA-based feature selection and parameters optimizationfor support vector machines publication-title: Expert Syst. Appl. contributor: fullname: Wang – start-page: 101 year: 2006 end-page: 123 ident: bib0053 article-title: Ant Colony Clustering and Feature Extraction for Anomaly Intrusion Detection contributor: fullname: Kwong – volume: 96 start-page: 61 year: 2016 end-page: 75 ident: bib0013 article-title: Evolving support vector machines using fruit fly optimization for medical data classification publication-title: Knowl. Based Syst. contributor: fullname: Liu – start-page: 473 year: 2008 end-page: 477 ident: bib0052 article-title: A New Intrusion Detection Method Based on BPSO-SVM publication-title: 2008 Int. Symp. Comput. Intell. Des. contributor: fullname: Liu – volume: 35 start-page: 1817 year: 2008 end-page: 1824 ident: bib0012 article-title: Particle swarm optimization for parameter determination and feature selection of support vector machines publication-title: Expert Syst. Appl. contributor: fullname: Lee – start-page: 103 year: 2013 end-page: 111 ident: bib0045 article-title: Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques contributor: fullname: de la Hoz – volume: 4 start-page: 1 year: 2010 end-page: 6 ident: bib0049 article-title: Application of variant of adaboost based machine learning algorithm in network intrusion detection publication-title: Int. J. Comput. Sci. Secur. contributor: fullname: Patil – volume: 40 start-page: 1 year: 2013 end-page: 6 ident: bib0014 article-title: Anomaly intrusion detection based on PLS feature extraction and core vector machine publication-title: Knowl. Based Syst. contributor: fullname: Cong – volume: 2 start-page: 33 year: 2010 end-page: 46 ident: bib0057 article-title: A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection publication-title: Doi.org. contributor: fullname: Habibi – volume: 121 start-page: 32 year: 2017 end-page: 40 ident: bib0009 article-title: A novel outlier cluster detection algorithm without top-n parameter publication-title: Knowl. Based Syst contributor: fullname: Wu – volume: 40 start-page: 2373 year: 2007 end-page: 2391 ident: bib0046 article-title: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection publication-title: Pattern Recognit contributor: fullname: Wang – year: 2000 ident: bib0030 publication-title: Support Vector Machines and Other Kernel-Based Learning Methods contributor: fullname: Shawe-Taylor – volume: 4 start-page: 716 year: 2015 ident: bib0026 article-title: Pathological brain detection in MRI scanning by wavelet packet Tsallis entropy and fuzzy support vector machine publication-title: Springerplus contributor: fullname: Yuan – year: 2004 ident: bib0029 article-title: Classification of hyperspectral remote sensing images with support vector machines publication-title: IEEE Trans. Geosci. contributor: fullname: Bruzzone – volume: 17 year: 2007 ident: bib0004 article-title: Russia accused of unleashing cyberwar to disable Estonia publication-title: The Guardian contributor: fullname: Traynor – volume: 64 start-page: 107 year: 2005 end-page: 117 ident: bib0017 article-title: Evolutionary tuning of multiple SVM parameters publication-title: Neurocomputing contributor: fullname: Igel – volume: 17 start-page: 1795 year: 2015 end-page: 1813 ident: bib0028 article-title: Preclinical Diagnosis of Magnetic Resonance (MR) Brain Images via Discrete Wavelet Packet Transform with Tsallis Entropy and Generalized Eigenvalue Proximate Support Vector Machine (GEPSVM) publication-title: Entropy contributor: fullname: Yang – volume: 18 start-page: 178 year: 2014 end-page: 184 ident: bib0008 article-title: A novel hybrid KPCA and SVM with GA model for intrusion detection publication-title: Appl. Soft Comput. contributor: fullname: Zhang – year: 2015 ident: bib0023 article-title: Feature selection and parameter optimization of support vector machines based on modified cat swarm optimization publication-title: Int. J. Distrib. contributor: fullname: Lin – volume: 239 start-page: 180 year: 2014 end-page: 197 ident: bib0019 article-title: Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy publication-title: Appl. Math. Comput. contributor: fullname: bin Liu – volume: 36 start-page: 11994 year: 2009 end-page: 12000 ident: bib0001 article-title: Intrusion detection by machine learning: a review publication-title: Expert Syst. Appl. contributor: fullname: Lin – year: 2016 ident: bib0033 article-title: Rough set-hypergraph-based feature selection approach for intrusion detection systems publication-title: Def. Sci. contributor: fullname: Pal – volume: 40 start-page: 239 year: 2016 ident: bib0038 article-title: Hypergraph based feature selection technique for medical diagnosis publication-title: J. Med. Syst. contributor: fullname: Sriram – year: 2007 ident: bib0047 article-title: A hierarchical SOM-based intrusion detection system publication-title: Eng. Appl. contributor: fullname: Zincir-Heywood – start-page: 5 year: 2010 end-page: 10 ident: bib0048 article-title: Discriminative multinomial Naïve Bayes for network intrusion detection publication-title: 2010 Sixth Int. Conf. Inf. Assur. Secur. contributor: fullname: Patra – year: 1973 ident: bib0039 article-title: Graphs and Hypergraphs contributor: fullname: Minieka – year: 1991 ident: bib0031 article-title: Handbook of Genetic Algorithms contributor: fullname: Davis – volume: 42 start-page: 8609 year: 2015 end-page: 8624 ident: bib0044 article-title: An intrusion detection system using network traffic profiling and online sequential extreme learning machine publication-title: Expert Syst. Appl. contributor: fullname: Singla – volume: 21 start-page: 58 year: 2015 end-page: 73 ident: bib0027 article-title: Detection of Alzheimer's disease and mild cognitive impairment based on structural volumetric MR images using 3D-DWT and WTA-KSVM trained by PSOTVAC publication-title: Biomed. Signal Process. Control contributor: fullname: Yang – volume: 19 start-page: 105 year: 2011 end-page: 115 ident: bib0011 article-title: A kernel fuzzy c-means clustering-based fuzzy support vector machine algorithm for classification problems with outliers or noises publication-title: IEEE Trans. Fuzzy Syst. contributor: fullname: Ma – start-page: 1 year: 2009 end-page: 6 ident: bib0051 article-title: A detailed analysis of the KDD CUP 99 data set publication-title: 2009 IEEE Symp. Comput. Intell. Secur. Def. Appl. contributor: fullname: Ghorbani – volume: 8 start-page: 1381 year: 2008 end-page: 1391 ident: bib0018 article-title: A distributed PSO–SVM hybrid system with feature selection and parameter optimization publication-title: Appl. Soft Comput. contributor: fullname: Dun – volume: 4289 start-page: 1 year: 2014 end-page: 5 ident: bib0003 article-title: Cyber attacks on US companies in 2014 publication-title: The Heritage Foundation contributor: fullname: Walters – volume: 199 start-page: 90 year: 2016 end-page: 102 ident: bib0020 article-title: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization publication-title: Neurocomputing contributor: fullname: Shi – volume: 2 start-page: 1 year: 2011 end-page: 27 ident: bib0042 article-title: LIBSVM publication-title: ACM Trans. Intell. Syst. Technol. contributor: fullname: Lin – year: 2009 ident: bib0041 article-title: A detailed analysis of the KDD CUP 99 data set publication-title: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications contributor: fullname: Lu – year: 2017 ident: bib0010 article-title: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems publication-title: Neural Netw. contributor: fullname: Sriram – volume: 64 start-page: 107 year: 2005 ident: 10.1016/j.knosys.2017.07.005_bib0017 article-title: Evolutionary tuning of multiple SVM parameters publication-title: Neurocomputing doi: 10.1016/j.neucom.2004.11.022 contributor: fullname: Friedrichs – year: 2017 ident: 10.1016/j.knosys.2017.07.005_bib0010 article-title: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems publication-title: Neural Netw. contributor: fullname: Gauthama Raman – ident: 10.1016/j.knosys.2017.07.005_bib0040 – volume: 18 start-page: 178 year: 2014 ident: 10.1016/j.knosys.2017.07.005_bib0008 article-title: A novel hybrid KPCA and SVM with GA model for intrusion detection publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2014.01.028 contributor: fullname: Kuang – year: 2007 ident: 10.1016/j.knosys.2017.07.005_bib0047 article-title: A hierarchical SOM-based intrusion detection system publication-title: Eng. Appl. contributor: fullname: Kayacik – start-page: 5 year: 2010 ident: 10.1016/j.knosys.2017.07.005_bib0048 article-title: Discriminative multinomial Naïve Bayes for network intrusion detection contributor: fullname: Panda – year: 1973 ident: 10.1016/j.knosys.2017.07.005_bib0039 contributor: fullname: Berge – volume: 19 start-page: 105 year: 2011 ident: 10.1016/j.knosys.2017.07.005_bib0011 article-title: A kernel fuzzy c-means clustering-based fuzzy support vector machine algorithm for classification problems with outliers or noises publication-title: IEEE Trans. Fuzzy Syst. doi: 10.1109/TFUZZ.2010.2087382 contributor: fullname: Yang – year: 2015 ident: 10.1016/j.knosys.2017.07.005_bib0023 article-title: Feature selection and parameter optimization of support vector machines based on modified cat swarm optimization publication-title: Int. J. Distrib. doi: 10.1155/2015/365869 contributor: fullname: Lin – volume: 36 start-page: 11994 year: 2009 ident: 10.1016/j.knosys.2017.07.005_bib0001 article-title: Intrusion detection by machine learning: a review publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2009.05.029 contributor: fullname: Tsai – volume: 42 start-page: 8609 year: 2015 ident: 10.1016/j.knosys.2017.07.005_bib0044 article-title: An intrusion detection system using network traffic profiling and online sequential extreme learning machine publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2015.07.015 contributor: fullname: Singh – volume: 141 start-page: 79 year: 2015 ident: 10.1016/j.knosys.2017.07.005_bib0016 article-title: Melt index prediction by least squares support vector machines with an adaptive mutation fruit fly optimization algorithm publication-title: Chemom. Intell. Lab. Syst. doi: 10.1016/j.chemolab.2014.12.007 contributor: fullname: Wang – year: 2000 ident: 10.1016/j.knosys.2017.07.005_bib0030 contributor: fullname: Christiannini – volume: 40 start-page: 1 year: 2013 ident: 10.1016/j.knosys.2017.07.005_bib0014 article-title: Anomaly intrusion detection based on PLS feature extraction and core vector machine publication-title: Knowl. Based Syst. doi: 10.1016/j.knosys.2012.09.004 contributor: fullname: Gan – volume: 4 start-page: 1 year: 2010 ident: 10.1016/j.knosys.2017.07.005_bib0049 article-title: Application of variant of adaboost based machine learning algorithm in network intrusion detection publication-title: Int. J. Comput. Sci. Secur. contributor: fullname: Kshirsagar – year: 2016 ident: 10.1016/j.knosys.2017.07.005_bib0033 article-title: Rough set-hypergraph-based feature selection approach for intrusion detection systems publication-title: Def. Sci. doi: 10.14429/dsj.66.10802 contributor: fullname: Raman – volume: 17 start-page: 1795 year: 2015 ident: 10.1016/j.knosys.2017.07.005_bib0028 article-title: Preclinical Diagnosis of Magnetic Resonance (MR) Brain Images via Discrete Wavelet Packet Transform with Tsallis Entropy and Generalized Eigenvalue Proximate Support Vector Machine (GEPSVM) publication-title: Entropy doi: 10.3390/e17041795 contributor: fullname: Zhang – volume: 30 start-page: 625 year: 2011 ident: 10.1016/j.knosys.2017.07.005_bib0007 article-title: Swarm intelligence in intrusion detection: a survey publication-title: Comput. Secur. doi: 10.1016/j.cose.2011.08.009 contributor: fullname: Kolias – volume: 38 start-page: 5197 year: 2011 ident: 10.1016/j.knosys.2017.07.005_bib0024 article-title: Feature selection and parameter optimization for support vector machines: a new approach based on genetic algorithm with feature chromosomes publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2010.10.041 contributor: fullname: Zhao – volume: 4 start-page: 716 year: 2015 ident: 10.1016/j.knosys.2017.07.005_bib0026 article-title: Pathological brain detection in MRI scanning by wavelet packet Tsallis entropy and fuzzy support vector machine publication-title: Springerplus doi: 10.1186/s40064-015-1523-4 contributor: fullname: Zhang – volume: 31 start-page: 231 year: 2006 ident: 10.1016/j.knosys.2017.07.005_bib0021 article-title: A GA-based feature selection and parameters optimizationfor support vector machines publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2005.09.024 contributor: fullname: Huang – year: 2010 ident: 10.1016/j.knosys.2017.07.005_bib0032 article-title: Root mean square filter for noisy images based on hyper graph model publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2010.01.013 contributor: fullname: Kannan – volume: 0 start-page: 1 year: 2017 ident: 10.1016/j.knosys.2017.07.005_bib0034 article-title: Development of rough set – hypergraph technique for key feature identification in intrusion detection systems publication-title: Comput. Electr. Eng. contributor: fullname: Gauthama Raman – year: 2004 ident: 10.1016/j.knosys.2017.07.005_bib0029 article-title: Classification of hyperspectral remote sensing images with support vector machines publication-title: IEEE Trans. Geosci. doi: 10.1109/TGRS.2004.831865 contributor: fullname: Melgani – volume: 40 start-page: 239 year: 2016 ident: 10.1016/j.knosys.2017.07.005_bib0038 article-title: Hypergraph based feature selection technique for medical diagnosis publication-title: J. Med. Syst. doi: 10.1007/s10916-016-0600-8 contributor: fullname: Somu – volume: 12 start-page: 3014 year: 2012 ident: 10.1016/j.knosys.2017.07.005_bib0002 article-title: A hybrid network intrusion detection system using simplified swarm optimization (SSO) publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2012.04.020 contributor: fullname: Chung – start-page: 101 year: 2006 ident: 10.1016/j.knosys.2017.07.005_bib0053 contributor: fullname: Tsang – volume: 40 start-page: 2373 year: 2007 ident: 10.1016/j.knosys.2017.07.005_bib0046 article-title: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection publication-title: Pattern Recognit doi: 10.1016/j.patcog.2006.12.009 contributor: fullname: Tsang – volume: 21 start-page: 58 year: 2015 ident: 10.1016/j.knosys.2017.07.005_bib0027 article-title: Detection of Alzheimer's disease and mild cognitive impairment based on structural volumetric MR images using 3D-DWT and WTA-KSVM trained by PSOTVAC publication-title: Biomed. Signal Process. Control doi: 10.1016/j.bspc.2015.05.014 contributor: fullname: Zhang – volume: 239 start-page: 180 year: 2014 ident: 10.1016/j.knosys.2017.07.005_bib0019 article-title: Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy publication-title: Appl. Math. Comput. doi: 10.1016/j.amc.2014.04.039 contributor: fullname: ling Chen – year: 2009 ident: 10.1016/j.knosys.2017.07.005_bib0041 article-title: A detailed analysis of the KDD CUP 99 data set contributor: fullname: Tavallaee – volume: 121 start-page: 32 year: 2017 ident: 10.1016/j.knosys.2017.07.005_bib0009 article-title: A novel outlier cluster detection algorithm without top-n parameter publication-title: Knowl. Based Syst doi: 10.1016/j.knosys.2017.01.013 contributor: fullname: Huang – volume: 2 start-page: 1 year: 2011 ident: 10.1016/j.knosys.2017.07.005_bib0042 article-title: LIBSVM publication-title: ACM Trans. Intell. Syst. Technol. doi: 10.1145/1961189.1961199 contributor: fullname: Chang – start-page: 103 year: 2013 ident: 10.1016/j.knosys.2017.07.005_bib0045 contributor: fullname: de la Hoz – volume: 8 start-page: 1381 year: 2008 ident: 10.1016/j.knosys.2017.07.005_bib0018 article-title: A distributed PSO–SVM hybrid system with feature selection and parameter optimization publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2007.10.007 contributor: fullname: Huang – volume: 3 start-page: 1 year: 2008 ident: 10.1016/j.knosys.2017.07.005_bib0056 article-title: An adaptive automatically tuning intrusion detection system publication-title: ACM Trans. Auton. Adapt. Syst. doi: 10.1145/1380422.1380425 contributor: fullname: Yu – volume: 5 start-page: 4430 year: 2012 ident: 10.1016/j.knosys.2017.07.005_bib0015 article-title: Annual electric load forecasting by a least squares support vector machine with a fruit fly optimization algorithm publication-title: Energies doi: 10.3390/en5114430 contributor: fullname: Li – start-page: 473 year: 2008 ident: 10.1016/j.knosys.2017.07.005_bib0052 article-title: A New Intrusion Detection Method Based on BPSO-SVM contributor: fullname: Ma – volume: 57 start-page: 270 year: 2013 ident: 10.1016/j.knosys.2017.07.005_bib0022 article-title: Facing the classification of binary problems with a GSA-SVM hybrid system publication-title: Math. Comput. Model. doi: 10.1016/j.mcm.2011.06.048 contributor: fullname: Sarafrazi – volume: 2016 start-page: 1 year: 2016 ident: 10.1016/j.knosys.2017.07.005_bib0025 article-title: A parallel genetic algorithm based feature selection and parameter optimization for support vector machine publication-title: Sci. Program. contributor: fullname: Chen – volume: 2 start-page: 33 year: 2010 ident: 10.1016/j.knosys.2017.07.005_bib0057 article-title: A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection publication-title: Doi.org. contributor: fullname: Abadeh – year: 2016 ident: 10.1016/j.knosys.2017.07.005_bib0043 article-title: Data Mining: Practical machine learning tools and techniques publication-title: Morgan Kaufmann contributor: fullname: Witten – year: 2016 ident: 10.1016/j.knosys.2017.07.005_bib0035 article-title: A computational model for ranking cloud service providers using hypergraph based techniques publication-title: Futur. Gener. Comput. Syst contributor: fullname: Nivethitha – year: 1991 ident: 10.1016/j.knosys.2017.07.005_bib0031 contributor: fullname: Davis – start-page: 1 year: 2009 ident: 10.1016/j.knosys.2017.07.005_bib0051 article-title: A detailed analysis of the KDD CUP 99 data set contributor: fullname: Tavallaee – volume: 17 issue: 05 year: 2007 ident: 10.1016/j.knosys.2017.07.005_bib0004 article-title: Russia accused of unleashing cyberwar to disable Estonia publication-title: The Guardian contributor: fullname: Traynor – volume: 199 start-page: 90 year: 2016 ident: 10.1016/j.knosys.2017.07.005_bib0020 article-title: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization publication-title: Neurocomputing doi: 10.1016/j.neucom.2016.03.031 contributor: fullname: Hosseini Bamakan – volume: 18 start-page: 2015 issue: 5 year: 2008 ident: 10.1016/j.knosys.2017.07.005_bib0005 article-title: Georgia President’s Web Site under DDoS Attack from Russian Hackers publication-title: Cit. dne contributor: fullname: Danchev – year: 2017 ident: 10.1016/j.knosys.2017.07.005_bib0037 article-title: A rough set-based hypergraph trust measure parameter selection technique for cloud service selection publication-title: J. Supercomput. doi: 10.1007/s11227-017-2032-8 contributor: fullname: Somu – volume: 4289 start-page: 1 year: 2014 ident: 10.1016/j.knosys.2017.07.005_bib0003 article-title: Cyber attacks on US companies in 2014 publication-title: The Heritage Foundation contributor: fullname: Walters – volume: 35 start-page: 1817 year: 2008 ident: 10.1016/j.knosys.2017.07.005_bib0012 article-title: Particle swarm optimization for parameter determination and feature selection of support vector machines publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2007.08.088 contributor: fullname: Lin – year: 2007 ident: 10.1016/j.knosys.2017.07.005_bib0006 contributor: fullname: Scarfone – volume: 96 start-page: 61 year: 2016 ident: 10.1016/j.knosys.2017.07.005_bib0013 article-title: Evolving support vector machines using fruit fly optimization for medical data classification publication-title: Knowl. Based Syst. doi: 10.1016/j.knosys.2016.01.002 contributor: fullname: Shen |
SSID | ssj0002218 |
Score | 2.6270866 |
Snippet | Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 1 |
SubjectTerms | Adaptive systems Alarm systems Artificial intelligence Cybersecurity Feature extraction Feature subset Genetic algorithm Genetic algorithms Graph theory Hypergraph Intrusion detection system Intrusion detection systems Kernel parameters Machine learning Optimization Parameter optimization Support vector machine Support vector machines |
Title | An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine |
URI | https://dx.doi.org/10.1016/j.knosys.2017.07.005 https://www.proquest.com/docview/1966851321 |
Volume | 134 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NTxsxELUgXHqh0A9BCWgOXN3s2t5N9hghohQEF4rEzbK9dtm22UQkVOqlP6S_lhmvF6lVpUocba3tlWc882zPPDN2GoqxKqUNfOIyz9XEBF5ZijK3ucutR0hr6Lzj6rqc36qLu-Jui531uTAUVplsf2fTo7VONaM0m6NV04xuEBygviJgQCWVgpL4duIl0YDtTD9dzq-fDbIQ8ZiPvufUoM-gi2Fe39rl-ifxdufjyOJJ79j920P9ZaujA5rtsd2EHGHa_dw-2_LtG_a6f5UB0iJ9y35PW_CRGAL9CTQtZVXg5EPtNzHsqoWOvRnIgdWA5Xvciz5E5mrgQDzUOAKY71-WD83mfgEIa4EYwhcUOQNLtDGLlLwJpq0h-MgNCuv4og7VNjjE44qAPfyIlwKwiCGb_h27nZ1_Ppvz9AIDd1KqDTfG5YJIuKrKKekCwiGX1dUEYZL3QhaqVCELzqpgMy-sKWspK-NVXVhDQFC-Z4N22foDBqGSsjCiRqOWKSfcJEjsF3eP0uQGMeUh4_2s61VHtKH7CLSvupOSJinpjG7Mi0M27kWj_1AYjb7gPy2HvSR1WrBrjYaoRPApRf7hxR0fsVdUIs-WF0M2QPn6Y4QsG3vCtj_-yk-SYj4BCB7vUA |
link.rule.ids | 315,783,787,4511,24130,27938,27939,45599,45693 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3BTtwwELUQHMqlUKDqwrbMgavZxHaymyNCrLYtcClI3CzbsSHAZlfsgsSlH9KvZcZJVFEhIfUYx7Ejz3jm2Z55ZuwgZEOVSxv4yCWeq5EJvLAUZW5Tl1qPkNbQfsfZeT65VD-usqsVdtzlwlBYZWv7G5serXVbMmhHczCvqsEvBAeorwgYUEmloCS-NUX8WajUh7__xnkIETf5qDan6l3-XAzyuqtni2di7U6HkcOTbrF72z_9Y6mj-xlvso8tboSj5tc-sRVfb7GN7k4GaKfoNvtzVIOPtBDoTaCqKacChx5Kv4xBVzU03M1A7qsEfL7BlehD5K0GDsRCjT2Aub-ePVTLmykgqAXiB59S3AzM0MJM29RNMHUJwUdmUFjE-3SotMIuHucE6-EpHgnANAZs-h12OT65OJ7w9v4F7qRUS26MSwVRcBWFU9IFBEMuKYsRgiTvhcxUrkISnFXBJl5Yk5dSFsarMrOGYKD8zFbrWe2_MAiFlJkRJZq0RDnhRkFiu7h2lCY1iCh7jHejrucNzYbu4s9udSMlTVLSCZ2XZz027ESjX6mLRk_wzpf9TpK6na4LjWYoR-gpRbr73w3vsw-Ti7NTffr9_OceW6c35OPSrM9WUdb-K4KXpf0WlfMFUYLwMg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+efficient+intrusion+detection+system+based+on+hypergraph+-+Genetic+algorithm+for+parameter+optimization+and+feature+selection+in+support+vector+machine&rft.jtitle=Knowledge-based+systems&rft.au=Gauthama+Raman%2C+M.R.&rft.au=Somu%2C+Nivethitha&rft.au=Kirthivasan%2C+Kannan&rft.au=Liscano%2C+Ramiro&rft.date=2017-10-15&rft.issn=0950-7051&rft.volume=134&rft.spage=1&rft.epage=12&rft_id=info:doi/10.1016%2Fj.knosys.2017.07.005&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_knosys_2017_07_005 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0950-7051&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0950-7051&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0950-7051&client=summon |