An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine

Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many machine learning based intrusion detection techniques. However, the benefits and limitations of these techniques make the development of an e...

Full description

Saved in:
Bibliographic Details
Published inKnowledge-based systems Vol. 134; pp. 1 - 12
Main Authors Gauthama Raman, M.R., Somu, Nivethitha, Kirthivasan, Kannan, Liscano, Ramiro, Shankar Sriram, V.S.
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier B.V 15.10.2017
Elsevier Science Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many machine learning based intrusion detection techniques. However, the benefits and limitations of these techniques make the development of an efficient Intrusion Detection System (IDS), an open challenge. This paper presents an adaptive, and a robust intrusion detection technique using Hypergraph based Genetic Algorithm (HG - GA) for parameter setting and feature selection in Support Vector Machine (SVM). Hyper – clique property of Hypergraph was exploited for the generation of initial population to fasten the search for the optimal solution and to prevent the trap at the local minima. HG-GA uses a weighted objective function to maintain the trade-off between maximizing the detection rate and minimizing the false alarm rate, along with the optimal number of features. The performance of HG-GA SVM was evaluated using NSL-KDD intrusion dataset under two scenarios (i) All features and (ii) informative features obtained from HG – GA. Experimental results show the prominence of HG-GA SVM over the existing techniques in terms of classifier accuracy, detection rate, false alarm rate, and runtime analysis.
AbstractList Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many machine learning based intrusion detection techniques. However, the benefits and limitations of these techniques make the development of an efficient Intrusion Detection System (IDS), an open challenge. This paper presents an adaptive, and a robust intrusion detection technique using Hypergraph based Genetic Algorithm (HG-GA) for parameter setting and feature selection in Support Vector Machine (SVM). Hyper-clique property of Hypergraph was exploited for the generation of initial population to fasten the search for the optimal solution and to prevent the trap at the local minima. HG-GA uses a weighted objective function to maintain the trade-off between maximizing the detection rate and minimizing the false alarm rate, along with the optimal number of features. The performance of HG-GA SVM was evaluated using NSL-KDD intrusion dataset under two scenarios (i) All features and (ii) informative features obtained from HG-GA. Experimental results show the prominence of HG-GA SVM over the existing techniques in terms of classifier accuracy, detection rate, false alarm rate, and runtime analysis.
Author Gauthama Raman, M.R.
Kirthivasan, Kannan
Somu, Nivethitha
Liscano, Ramiro
Shankar Sriram, V.S.
Author_xml – sequence: 1
  givenname: M.R.
  surname: Gauthama Raman
  fullname: Gauthama Raman, M.R.
  email: gauthamaraman_mr@sastra.ac.in
  organization: Centre for Information Super Highway (CISH), School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India
– sequence: 2
  givenname: Nivethitha
  surname: Somu
  fullname: Somu, Nivethitha
  email: nivethitha@sastra.ac.in
  organization: Centre for Information Super Highway (CISH), School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India
– sequence: 3
  givenname: Kannan
  surname: Kirthivasan
  fullname: Kirthivasan, Kannan
  email: kkannan@maths.sastra.edu
  organization: Discrete Mathematics Research Laboratory (DMRL), Department of Mathematics, SASTRA University, Thanjavur, Tamil Nadu, India
– sequence: 4
  givenname: Ramiro
  surname: Liscano
  fullname: Liscano, Ramiro
  email: ramiro.liscano@uoit.ca
  organization: Department of Electrical, Computer and Software Engineering, University of Ontario Institute of Technology, Oshawa, Ontario, Canada
– sequence: 5
  givenname: V.S.
  surname: Shankar Sriram
  fullname: Shankar Sriram, V.S.
  email: sriram@it.sastra.edu
  organization: Centre for Information Super Highway (CISH), School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India
BookMark eNp9kcFq3DAQhkVJIJs0b5CDoGdvR7Zkry-FENq0EOilPQtZHmW1XUvuSA5sH6VPG7mbc2FAmmHmG_75r9lFiAEZuxOwFSDaj4ftrxDTKW1rEN0WSoB6xzZi19VVJ6G_YBvoFVQdKHHFrlM6AEBdi92G_b0PHJ3z1mPI3IdMS_Ix8BEz2rz-CjfjxAeTcOQl359mpGcy855X_BEDZm-5OT5H8nk_cReJz4bMVADE45z95P-YfyQTRu7Q5IWQJzy-8X1ZscxzpMxfSqmMT8bufcD37NKZY8Lbt_eG_fzy-cfD1-rp--O3h_unyjaNzJUxVhTdrex7KxvrWlFbGPudagGxbpRspQNnB-kGwHow7dg0vUE5qsGA6lRzwz6cuTPF3wumrA9xoVBWatG37U6JphalS567LMWUCJ2eyU-GTlqAXl3QB312Qa8uaCgBK_zTeQyLghePpNN6aoujp6JWj9H_H_AKL9eYpg
CitedBy_id crossref_primary_10_12720_jait_15_1_147_154
crossref_primary_10_1007_s00521_023_08511_2
crossref_primary_10_1016_j_jbusres_2021_04_038
crossref_primary_10_1109_ACCESS_2021_3075066
crossref_primary_10_1016_j_neunet_2018_08_005
crossref_primary_10_1016_j_orp_2023_100279
crossref_primary_10_1088_1757_899X_1022_1_012036
crossref_primary_10_1007_s00607_022_01059_4
crossref_primary_10_1088_1742_6596_1601_3_032048
crossref_primary_10_1007_s00521_021_06093_5
crossref_primary_10_1016_j_compeleceng_2022_108383
crossref_primary_10_1016_j_comnet_2020_107183
crossref_primary_10_1016_j_knosys_2023_110421
crossref_primary_10_3934_mbe_2021208
crossref_primary_10_1016_j_cor_2022_106131
crossref_primary_10_1016_j_future_2018_04_033
crossref_primary_10_1007_s00500_018_03753_y
crossref_primary_10_1038_s41598_023_36304_z
crossref_primary_10_1007_s11277_022_10063_y
crossref_primary_10_21595_jve_2019_20207
crossref_primary_10_1007_s00521_019_04236_3
crossref_primary_10_1016_j_micpro_2022_104752
crossref_primary_10_1109_TIA_2020_2977872
crossref_primary_10_1007_s10586_017_1643_4
crossref_primary_10_1016_j_eswa_2022_119189
crossref_primary_10_1007_s00521_022_07203_7
crossref_primary_10_1007_s11277_021_08368_5
crossref_primary_10_29121_granthaalayah_v8_i8_2020_1031
crossref_primary_10_1016_j_heliyon_2023_e13633
crossref_primary_10_1016_j_comnet_2018_11_010
crossref_primary_10_1016_j_net_2020_05_012
crossref_primary_10_3390_s22010140
crossref_primary_10_1007_s10462_022_10328_9
crossref_primary_10_1007_s40747_023_01313_y
crossref_primary_10_1007_s10462_019_09762_z
crossref_primary_10_1016_j_rineng_2022_100542
crossref_primary_10_1155_2022_7799769
crossref_primary_10_1007_s10044_021_00985_x
crossref_primary_10_1007_s12530_021_09393_2
crossref_primary_10_1016_j_eswa_2022_118120
crossref_primary_10_1007_s11416_022_00431_4
crossref_primary_10_1016_j_knosys_2020_106456
crossref_primary_10_3390_math10244745
crossref_primary_10_17482_uumfd_747078
crossref_primary_10_3233_JIFS_232532
crossref_primary_10_1016_j_jnca_2021_102983
crossref_primary_10_1109_COMST_2019_2922584
crossref_primary_10_1155_2024_3909173
crossref_primary_10_3390_electronics12051260
crossref_primary_10_1007_s00521_019_04655_2
crossref_primary_10_1016_j_knosys_2020_106602
crossref_primary_10_1007_s10462_021_10037_9
crossref_primary_10_1080_0952813X_2021_1960627
crossref_primary_10_1016_j_comnet_2020_107417
crossref_primary_10_1016_j_eij_2022_06_005
crossref_primary_10_1155_2022_6473507
crossref_primary_10_1109_ACCESS_2020_3029202
crossref_primary_10_1007_s11416_021_00410_1
crossref_primary_10_1016_j_asoc_2019_105945
crossref_primary_10_1155_2022_6131463
crossref_primary_10_1007_s00500_021_05809_y
crossref_primary_10_1007_s11277_019_06972_0
crossref_primary_10_1155_2022_2215852
crossref_primary_10_1109_ACCESS_2021_3109081
crossref_primary_10_1016_j_future_2021_02_001
crossref_primary_10_1109_ACCESS_2018_2841987
crossref_primary_10_3390_s22062100
crossref_primary_10_1016_j_cose_2020_102055
crossref_primary_10_1016_j_eswa_2021_115620
crossref_primary_10_3390_su131910743
crossref_primary_10_1080_0952813X_2019_1647558
crossref_primary_10_3390_electronics10121375
crossref_primary_10_1142_S1469026820500169
crossref_primary_10_1016_j_apenergy_2019_114131
crossref_primary_10_1139_cjfr_2021_0265
crossref_primary_10_1111_coin_12497
crossref_primary_10_1016_j_comnet_2018_02_028
crossref_primary_10_1109_ACCESS_2019_2922692
crossref_primary_10_3390_s22052018
crossref_primary_10_1002_cpe_7134
crossref_primary_10_1016_j_iot_2022_100615
crossref_primary_10_1088_1757_899X_563_5_052019
crossref_primary_10_1002_dac_4434
crossref_primary_10_1088_1755_1315_428_1_012011
crossref_primary_10_3390_app10093227
crossref_primary_10_1016_j_eswa_2022_119301
crossref_primary_10_1016_j_knosys_2022_108640
crossref_primary_10_1007_s00366_021_01369_9
crossref_primary_10_1016_j_eswa_2022_117485
crossref_primary_10_1016_j_knosys_2020_105650
crossref_primary_10_1016_j_knosys_2020_105648
crossref_primary_10_1007_s13369_019_04178_x
crossref_primary_10_1016_j_knosys_2020_106614
crossref_primary_10_1155_2022_4685754
crossref_primary_10_1016_j_swevo_2019_100618
crossref_primary_10_32604_iasc_2023_028650
crossref_primary_10_1016_j_swevo_2019_100631
crossref_primary_10_1007_s10489_019_01503_7
crossref_primary_10_1007_s11633_022_1367_7
crossref_primary_10_1007_s11227_024_06235_1
crossref_primary_10_1002_tee_22987
crossref_primary_10_1016_j_eswa_2018_04_038
crossref_primary_10_1016_j_ijcip_2021_100449
crossref_primary_10_1002_spy2_429
crossref_primary_10_1016_j_knosys_2021_107221
crossref_primary_10_1155_2020_5287684
crossref_primary_10_1007_s11277_021_09393_0
crossref_primary_10_1016_j_eswa_2019_112845
crossref_primary_10_1016_j_eswa_2022_116545
crossref_primary_10_1155_2019_7130868
crossref_primary_10_1016_j_eswa_2022_116822
crossref_primary_10_1016_j_asoc_2023_110412
crossref_primary_10_3390_a12010022
crossref_primary_10_1186_s42400_021_00095_5
crossref_primary_10_1002_ett_4798
crossref_primary_10_1016_j_asoc_2020_107038
crossref_primary_10_3390_s22041396
crossref_primary_10_1007_s11047_022_09912_3
crossref_primary_10_1007_s40747_021_00498_4
crossref_primary_10_32604_cmc_2022_018708
crossref_primary_10_1016_j_ijcip_2020_100393
crossref_primary_10_1515_jisys_2022_0059
crossref_primary_10_1155_2022_7898871
crossref_primary_10_4018_IJISMD_315024
crossref_primary_10_1109_ACCESS_2023_3251354
crossref_primary_10_1016_j_knosys_2022_109795
crossref_primary_10_1007_s00521_020_04701_4
crossref_primary_10_1063_5_0155459
crossref_primary_10_32604_cmc_2021_014172
crossref_primary_10_1016_j_jksuci_2018_03_011
crossref_primary_10_1007_s00500_019_03818_6
crossref_primary_10_3390_systems10040108
crossref_primary_10_1016_j_cose_2019_05_022
crossref_primary_10_1007_s12652_020_01919_x
crossref_primary_10_32604_cmc_2023_033273
crossref_primary_10_3233_JIFS_169960
Cites_doi 10.1016/j.neucom.2004.11.022
10.1016/j.asoc.2014.01.028
10.1109/TFUZZ.2010.2087382
10.1155/2015/365869
10.1016/j.eswa.2009.05.029
10.1016/j.eswa.2015.07.015
10.1016/j.chemolab.2014.12.007
10.1016/j.knosys.2012.09.004
10.14429/dsj.66.10802
10.3390/e17041795
10.1016/j.cose.2011.08.009
10.1016/j.eswa.2010.10.041
10.1186/s40064-015-1523-4
10.1016/j.eswa.2005.09.024
10.1016/j.imavis.2010.01.013
10.1109/TGRS.2004.831865
10.1007/s10916-016-0600-8
10.1016/j.asoc.2012.04.020
10.1016/j.patcog.2006.12.009
10.1016/j.bspc.2015.05.014
10.1016/j.amc.2014.04.039
10.1016/j.knosys.2017.01.013
10.1145/1961189.1961199
10.1016/j.asoc.2007.10.007
10.1145/1380422.1380425
10.3390/en5114430
10.1016/j.mcm.2011.06.048
10.1016/j.neucom.2016.03.031
10.1007/s11227-017-2032-8
10.1016/j.eswa.2007.08.088
10.1016/j.knosys.2016.01.002
ContentType Journal Article
Copyright 2017
Copyright Elsevier Science Ltd. Oct 15, 2017
Copyright_xml – notice: 2017
– notice: Copyright Elsevier Science Ltd. Oct 15, 2017
DBID AAYXX
CITATION
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
DOI 10.1016/j.knosys.2017.07.005
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7409
EndPage 12
ExternalDocumentID 10_1016_j_knosys_2017_07_005
S0950705117303209
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
77K
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABAOU
ABBOA
ABIVO
ABJNI
ABMAC
ABYKQ
ACAZW
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ARUGR
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
LY7
M41
MHUIS
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSW
SSZ
T5K
WH7
XPP
ZMT
~02
~G-
29L
AAQXK
AAXKI
AAYXX
ABXDB
ACNNM
ADJOM
ADMUD
AFJKZ
AKRWK
ASPBG
AVWKF
AZFZN
CITATION
FEDTE
FGOYB
G-2
G8K
HLZ
HVGLF
HZ~
R2-
SBC
SET
SEW
UHS
WUQ
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c334t-aac12016499c43cf612c0d98560ee235464f0fcb4fb0e2ba6d339ae4d5ba05753
IEDL.DBID AIKHN
ISSN 0950-7051
IngestDate Thu Oct 10 14:51:40 EDT 2024
Thu Sep 26 16:18:10 EDT 2024
Fri Feb 23 02:28:20 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Hypergraph
Support vector machine
Genetic algorithm
Intrusion detection system
Kernel parameters
Feature subset
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c334t-aac12016499c43cf612c0d98560ee235464f0fcb4fb0e2ba6d339ae4d5ba05753
PQID 1966851321
PQPubID 2035257
PageCount 12
ParticipantIDs proquest_journals_1966851321
crossref_primary_10_1016_j_knosys_2017_07_005
elsevier_sciencedirect_doi_10_1016_j_knosys_2017_07_005
PublicationCentury 2000
PublicationDate 2017-10-15
PublicationDateYYYYMMDD 2017-10-15
PublicationDate_xml – month: 10
  year: 2017
  text: 2017-10-15
  day: 15
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Knowledge-based systems
PublicationYear 2017
Publisher Elsevier B.V
Elsevier Science Ltd
Publisher_xml – name: Elsevier B.V
– name: Elsevier Science Ltd
References Nivethitha, Kannan, Shankar Sriram (bib0035) 2016
Tsang, Kwong (bib0053) 2006
Gan, Duanmu, Wang, Cong (bib0014) 2013; 40
Somu, Kirthivasan, Sriram (bib0037) 2017
Lin, Huang, Hung, Lin (bib0023) 2015
ling Chen, Yang, jing Wang, Wang, you Liu, zhong Li, bin Liu (bib0019) 2014; 239
Zhang, Dong, Wang, Ji, Yang (bib0028) 2015; 17
Tsai, Hsu, Lin, Lin (bib0001) 2009; 36
de la Hoz, Ortiz, Ortega, de la Hoz (bib0045) 2013
Wang, Liu (bib0016) 2015; 141
Berge, Minieka (bib0039) 1973
Zhang, Wang, Phillips, Dong, Ji, Yang (bib0027) 2015; 21
Walters (bib0003) 2014; 4289
Kayacik, Zincir-Heywood (bib0047) 2007
Chang, Lin (bib0042) 2011; 2
Yang, Zhang, Lu, Ma (bib0011) 2011; 19
Kuang, Xu, Zhang (bib0008) 2014; 18
Kannan, Kanna, Aravindan (bib0032) 2010
Ma, Liu, Liu (bib0052) 2008
Raman, Kannan, Pal (bib0033) 2016
Huang, Dun (bib0018) 2008; 8
Singh, Kumar, Singla (bib0044) 2015; 42
Kshirsagar, Patil (bib0049) 2010; 4
Tavallaee, Bagheri, Lu, Ghorbani (bib0051) 2009
Danchev (bib0005) 2008; 18
Hosseini Bamakan, Wang, Yingjie, Shi (bib0020) 2016; 199
Scarfone, Mell (bib0006) 2007
Traynor (bib0004) 2007; 17
NSL-KDD Data Set, [Online]. Available:http://www.unb.ca/cic/research/datasets/nsl.html, (n.d.).
Melgani, Bruzzone (bib0029) 2004
Friedrichs, Igel (bib0017) 2005; 64
Sarafrazi, Nezamabadi-pour (bib0022) 2013; 57
Yu, Tsai, Weigert (bib0056) 2008; 3
Zhang, Wang, Yang, Dong, Liu, Phillips, Yuan (bib0026) 2015; 4
Panda, Abraham, Patra (bib0048) 2010
Chung, Wahid (bib0002) 2012; 12
Huang, Zhu, Yang, Cheng, Wu (bib0009) 2017; 121
Shen, Chen, Yu, Kang, Zhang, Li, Yang, Liu (bib0013) 2016; 96
Tsang, Kwong, Wang (bib0046) 2007; 40
Abadeh, Habibi (bib0057) 2010; 2
Gauthama Raman, Kirthivasan, Shankar Sriram (bib0034) 2017; 0
Kolias, Kambourakis, Maragoudakis (bib0007) 2011; 30
Davis (bib0031) 1991
Huang, Wang (bib0021) 2006; 31
Gauthama Raman, Somu, Kirthivasan, Sriram (bib0010) 2017
Christiannini, Shawe-Taylor (bib0030) 2000
Tavallaee, Bagheri, Lu (bib0041) 2009
Zhao, Fu, Ji, Tang, Zhou (bib0024) 2011; 38
Li, Guo, Zhao, Su, Wang (bib0015) 2012; 5
Chen, Lin, Tang, Xia, Chen, Lin, Tang, Xia (bib0025) 2016; 2016
Somu, Raman, Kirthivasan, Sriram (bib0038) 2016; 40
Lin, Ying, Chen, Lee (bib0012) 2008; 35
Witten (bib0043) 2016
Wang (10.1016/j.knosys.2017.07.005_bib0016) 2015; 141
Tavallaee (10.1016/j.knosys.2017.07.005_bib0041) 2009
Tavallaee (10.1016/j.knosys.2017.07.005_bib0051) 2009
Melgani (10.1016/j.knosys.2017.07.005_bib0029) 2004
Kshirsagar (10.1016/j.knosys.2017.07.005_bib0049) 2010; 4
Ma (10.1016/j.knosys.2017.07.005_bib0052) 2008
Zhang (10.1016/j.knosys.2017.07.005_bib0027) 2015; 21
Scarfone (10.1016/j.knosys.2017.07.005_bib0006) 2007
Gauthama Raman (10.1016/j.knosys.2017.07.005_bib0034) 2017; 0
Huang (10.1016/j.knosys.2017.07.005_bib0018) 2008; 8
Hosseini Bamakan (10.1016/j.knosys.2017.07.005_bib0020) 2016; 199
Tsai (10.1016/j.knosys.2017.07.005_bib0001) 2009; 36
Zhao (10.1016/j.knosys.2017.07.005_bib0024) 2011; 38
Kannan (10.1016/j.knosys.2017.07.005_bib0032) 2010
Somu (10.1016/j.knosys.2017.07.005_bib0038) 2016; 40
Gan (10.1016/j.knosys.2017.07.005_bib0014) 2013; 40
Nivethitha (10.1016/j.knosys.2017.07.005_bib0035) 2016
Tsang (10.1016/j.knosys.2017.07.005_bib0053) 2006
Berge (10.1016/j.knosys.2017.07.005_bib0039) 1973
ling Chen (10.1016/j.knosys.2017.07.005_bib0019) 2014; 239
Raman (10.1016/j.knosys.2017.07.005_bib0033) 2016
Lin (10.1016/j.knosys.2017.07.005_bib0012) 2008; 35
10.1016/j.knosys.2017.07.005_bib0040
Davis (10.1016/j.knosys.2017.07.005_bib0031) 1991
Walters (10.1016/j.knosys.2017.07.005_bib0003) 2014; 4289
Witten (10.1016/j.knosys.2017.07.005_bib0043) 2016
Huang (10.1016/j.knosys.2017.07.005_bib0009) 2017; 121
Lin (10.1016/j.knosys.2017.07.005_bib0023) 2015
Yu (10.1016/j.knosys.2017.07.005_bib0056) 2008; 3
de la Hoz (10.1016/j.knosys.2017.07.005_bib0045) 2013
Kolias (10.1016/j.knosys.2017.07.005_bib0007) 2011; 30
Somu (10.1016/j.knosys.2017.07.005_bib0037) 2017
Abadeh (10.1016/j.knosys.2017.07.005_bib0057) 2010; 2
Yang (10.1016/j.knosys.2017.07.005_bib0011) 2011; 19
Kuang (10.1016/j.knosys.2017.07.005_bib0008) 2014; 18
Danchev (10.1016/j.knosys.2017.07.005_bib0005) 2008; 18
Chung (10.1016/j.knosys.2017.07.005_bib0002) 2012; 12
Li (10.1016/j.knosys.2017.07.005_bib0015) 2012; 5
Zhang (10.1016/j.knosys.2017.07.005_bib0026) 2015; 4
Chang (10.1016/j.knosys.2017.07.005_bib0042) 2011; 2
Traynor (10.1016/j.knosys.2017.07.005_bib0004) 2007; 17
Tsang (10.1016/j.knosys.2017.07.005_bib0046) 2007; 40
Singh (10.1016/j.knosys.2017.07.005_bib0044) 2015; 42
Friedrichs (10.1016/j.knosys.2017.07.005_bib0017) 2005; 64
Huang (10.1016/j.knosys.2017.07.005_bib0021) 2006; 31
Chen (10.1016/j.knosys.2017.07.005_bib0025) 2016; 2016
Gauthama Raman (10.1016/j.knosys.2017.07.005_bib0010) 2017
Christiannini (10.1016/j.knosys.2017.07.005_bib0030) 2000
Kayacik (10.1016/j.knosys.2017.07.005_bib0047) 2007
Shen (10.1016/j.knosys.2017.07.005_bib0013) 2016; 96
Sarafrazi (10.1016/j.knosys.2017.07.005_bib0022) 2013; 57
Panda (10.1016/j.knosys.2017.07.005_bib0048) 2010
Zhang (10.1016/j.knosys.2017.07.005_bib0028) 2015; 17
References_xml – volume: 0
  start-page: 1
  year: 2017
  end-page: 12
  ident: bib0034
  article-title: Development of rough set – hypergraph technique for key feature identification in intrusion detection systems
  publication-title: Comput. Electr. Eng.
  contributor:
    fullname: Shankar Sriram
– year: 2016
  ident: bib0035
  article-title: A computational model for ranking cloud service providers using hypergraph based techniques
  publication-title: Futur. Gener. Comput. Syst
  contributor:
    fullname: Shankar Sriram
– volume: 3
  start-page: 1
  year: 2008
  end-page: 25
  ident: bib0056
  article-title: An adaptive automatically tuning intrusion detection system
  publication-title: ACM Trans. Auton. Adapt. Syst.
  contributor:
    fullname: Weigert
– volume: 30
  start-page: 625
  year: 2011
  end-page: 642
  ident: bib0007
  article-title: Swarm intelligence in intrusion detection: a survey
  publication-title: Comput. Secur.
  contributor:
    fullname: Maragoudakis
– year: 2007
  ident: bib0006
  article-title: Guide to Intrusion Detection and Prevention Systems (IDPS)
  contributor:
    fullname: Mell
– volume: 12
  start-page: 3014
  year: 2012
  end-page: 3022
  ident: bib0002
  article-title: A hybrid network intrusion detection system using simplified swarm optimization (SSO)
  publication-title: Appl. Soft Comput.
  contributor:
    fullname: Wahid
– volume: 141
  start-page: 79
  year: 2015
  end-page: 87
  ident: bib0016
  article-title: Melt index prediction by least squares support vector machines with an adaptive mutation fruit fly optimization algorithm
  publication-title: Chemom. Intell. Lab. Syst.
  contributor:
    fullname: Liu
– volume: 5
  start-page: 4430
  year: 2012
  end-page: 4445
  ident: bib0015
  article-title: Annual electric load forecasting by a least squares support vector machine with a fruit fly optimization algorithm
  publication-title: Energies
  contributor:
    fullname: Wang
– year: 2010
  ident: bib0032
  article-title: Root mean square filter for noisy images based on hyper graph model
  publication-title: Image Vis. Comput.
  contributor:
    fullname: Aravindan
– volume: 2016
  start-page: 1
  year: 2016
  end-page: 10
  ident: bib0025
  article-title: A parallel genetic algorithm based feature selection and parameter optimization for support vector machine
  publication-title: Sci. Program.
  contributor:
    fullname: Xia
– year: 2017
  ident: bib0037
  article-title: A rough set-based hypergraph trust measure parameter selection technique for cloud service selection
  publication-title: J. Supercomput.
  contributor:
    fullname: Sriram
– volume: 57
  start-page: 270
  year: 2013
  end-page: 278
  ident: bib0022
  article-title: Facing the classification of binary problems with a GSA-SVM hybrid system
  publication-title: Math. Comput. Model.
  contributor:
    fullname: Nezamabadi-pour
– year: 2016
  ident: bib0043
  article-title: Data Mining: Practical machine learning tools and techniques
  publication-title: Morgan Kaufmann
  contributor:
    fullname: Witten
– volume: 38
  start-page: 5197
  year: 2011
  end-page: 5204
  ident: bib0024
  article-title: Feature selection and parameter optimization for support vector machines: a new approach based on genetic algorithm with feature chromosomes
  publication-title: Expert Syst. Appl.
  contributor:
    fullname: Zhou
– volume: 18
  start-page: 2015
  year: 2008
  ident: bib0005
  article-title: Georgia President’s Web Site under DDoS Attack from Russian Hackers
  publication-title: Cit. dne
  contributor:
    fullname: Danchev
– volume: 31
  start-page: 231
  year: 2006
  end-page: 240
  ident: bib0021
  article-title: A GA-based feature selection and parameters optimizationfor support vector machines
  publication-title: Expert Syst. Appl.
  contributor:
    fullname: Wang
– start-page: 101
  year: 2006
  end-page: 123
  ident: bib0053
  article-title: Ant Colony Clustering and Feature Extraction for Anomaly Intrusion Detection
  contributor:
    fullname: Kwong
– volume: 96
  start-page: 61
  year: 2016
  end-page: 75
  ident: bib0013
  article-title: Evolving support vector machines using fruit fly optimization for medical data classification
  publication-title: Knowl. Based Syst.
  contributor:
    fullname: Liu
– start-page: 473
  year: 2008
  end-page: 477
  ident: bib0052
  article-title: A New Intrusion Detection Method Based on BPSO-SVM
  publication-title: 2008 Int. Symp. Comput. Intell. Des.
  contributor:
    fullname: Liu
– volume: 35
  start-page: 1817
  year: 2008
  end-page: 1824
  ident: bib0012
  article-title: Particle swarm optimization for parameter determination and feature selection of support vector machines
  publication-title: Expert Syst. Appl.
  contributor:
    fullname: Lee
– start-page: 103
  year: 2013
  end-page: 111
  ident: bib0045
  article-title: Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques
  contributor:
    fullname: de la Hoz
– volume: 4
  start-page: 1
  year: 2010
  end-page: 6
  ident: bib0049
  article-title: Application of variant of adaboost based machine learning algorithm in network intrusion detection
  publication-title: Int. J. Comput. Sci. Secur.
  contributor:
    fullname: Patil
– volume: 40
  start-page: 1
  year: 2013
  end-page: 6
  ident: bib0014
  article-title: Anomaly intrusion detection based on PLS feature extraction and core vector machine
  publication-title: Knowl. Based Syst.
  contributor:
    fullname: Cong
– volume: 2
  start-page: 33
  year: 2010
  end-page: 46
  ident: bib0057
  article-title: A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
  publication-title: Doi.org.
  contributor:
    fullname: Habibi
– volume: 121
  start-page: 32
  year: 2017
  end-page: 40
  ident: bib0009
  article-title: A novel outlier cluster detection algorithm without top-n parameter
  publication-title: Knowl. Based Syst
  contributor:
    fullname: Wu
– volume: 40
  start-page: 2373
  year: 2007
  end-page: 2391
  ident: bib0046
  article-title: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
  publication-title: Pattern Recognit
  contributor:
    fullname: Wang
– year: 2000
  ident: bib0030
  publication-title: Support Vector Machines and Other Kernel-Based Learning Methods
  contributor:
    fullname: Shawe-Taylor
– volume: 4
  start-page: 716
  year: 2015
  ident: bib0026
  article-title: Pathological brain detection in MRI scanning by wavelet packet Tsallis entropy and fuzzy support vector machine
  publication-title: Springerplus
  contributor:
    fullname: Yuan
– year: 2004
  ident: bib0029
  article-title: Classification of hyperspectral remote sensing images with support vector machines
  publication-title: IEEE Trans. Geosci.
  contributor:
    fullname: Bruzzone
– volume: 17
  year: 2007
  ident: bib0004
  article-title: Russia accused of unleashing cyberwar to disable Estonia
  publication-title: The Guardian
  contributor:
    fullname: Traynor
– volume: 64
  start-page: 107
  year: 2005
  end-page: 117
  ident: bib0017
  article-title: Evolutionary tuning of multiple SVM parameters
  publication-title: Neurocomputing
  contributor:
    fullname: Igel
– volume: 17
  start-page: 1795
  year: 2015
  end-page: 1813
  ident: bib0028
  article-title: Preclinical Diagnosis of Magnetic Resonance (MR) Brain Images via Discrete Wavelet Packet Transform with Tsallis Entropy and Generalized Eigenvalue Proximate Support Vector Machine (GEPSVM)
  publication-title: Entropy
  contributor:
    fullname: Yang
– volume: 18
  start-page: 178
  year: 2014
  end-page: 184
  ident: bib0008
  article-title: A novel hybrid KPCA and SVM with GA model for intrusion detection
  publication-title: Appl. Soft Comput.
  contributor:
    fullname: Zhang
– year: 2015
  ident: bib0023
  article-title: Feature selection and parameter optimization of support vector machines based on modified cat swarm optimization
  publication-title: Int. J. Distrib.
  contributor:
    fullname: Lin
– volume: 239
  start-page: 180
  year: 2014
  end-page: 197
  ident: bib0019
  article-title: Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy
  publication-title: Appl. Math. Comput.
  contributor:
    fullname: bin Liu
– volume: 36
  start-page: 11994
  year: 2009
  end-page: 12000
  ident: bib0001
  article-title: Intrusion detection by machine learning: a review
  publication-title: Expert Syst. Appl.
  contributor:
    fullname: Lin
– year: 2016
  ident: bib0033
  article-title: Rough set-hypergraph-based feature selection approach for intrusion detection systems
  publication-title: Def. Sci.
  contributor:
    fullname: Pal
– volume: 40
  start-page: 239
  year: 2016
  ident: bib0038
  article-title: Hypergraph based feature selection technique for medical diagnosis
  publication-title: J. Med. Syst.
  contributor:
    fullname: Sriram
– year: 2007
  ident: bib0047
  article-title: A hierarchical SOM-based intrusion detection system
  publication-title: Eng. Appl.
  contributor:
    fullname: Zincir-Heywood
– start-page: 5
  year: 2010
  end-page: 10
  ident: bib0048
  article-title: Discriminative multinomial Naïve Bayes for network intrusion detection
  publication-title: 2010 Sixth Int. Conf. Inf. Assur. Secur.
  contributor:
    fullname: Patra
– year: 1973
  ident: bib0039
  article-title: Graphs and Hypergraphs
  contributor:
    fullname: Minieka
– year: 1991
  ident: bib0031
  article-title: Handbook of Genetic Algorithms
  contributor:
    fullname: Davis
– volume: 42
  start-page: 8609
  year: 2015
  end-page: 8624
  ident: bib0044
  article-title: An intrusion detection system using network traffic profiling and online sequential extreme learning machine
  publication-title: Expert Syst. Appl.
  contributor:
    fullname: Singla
– volume: 21
  start-page: 58
  year: 2015
  end-page: 73
  ident: bib0027
  article-title: Detection of Alzheimer's disease and mild cognitive impairment based on structural volumetric MR images using 3D-DWT and WTA-KSVM trained by PSOTVAC
  publication-title: Biomed. Signal Process. Control
  contributor:
    fullname: Yang
– volume: 19
  start-page: 105
  year: 2011
  end-page: 115
  ident: bib0011
  article-title: A kernel fuzzy c-means clustering-based fuzzy support vector machine algorithm for classification problems with outliers or noises
  publication-title: IEEE Trans. Fuzzy Syst.
  contributor:
    fullname: Ma
– start-page: 1
  year: 2009
  end-page: 6
  ident: bib0051
  article-title: A detailed analysis of the KDD CUP 99 data set
  publication-title: 2009 IEEE Symp. Comput. Intell. Secur. Def. Appl.
  contributor:
    fullname: Ghorbani
– volume: 8
  start-page: 1381
  year: 2008
  end-page: 1391
  ident: bib0018
  article-title: A distributed PSO–SVM hybrid system with feature selection and parameter optimization
  publication-title: Appl. Soft Comput.
  contributor:
    fullname: Dun
– volume: 4289
  start-page: 1
  year: 2014
  end-page: 5
  ident: bib0003
  article-title: Cyber attacks on US companies in 2014
  publication-title: The Heritage Foundation
  contributor:
    fullname: Walters
– volume: 199
  start-page: 90
  year: 2016
  end-page: 102
  ident: bib0020
  article-title: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization
  publication-title: Neurocomputing
  contributor:
    fullname: Shi
– volume: 2
  start-page: 1
  year: 2011
  end-page: 27
  ident: bib0042
  article-title: LIBSVM
  publication-title: ACM Trans. Intell. Syst. Technol.
  contributor:
    fullname: Lin
– year: 2009
  ident: bib0041
  article-title: A detailed analysis of the KDD CUP 99 data set
  publication-title: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
  contributor:
    fullname: Lu
– year: 2017
  ident: bib0010
  article-title: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems
  publication-title: Neural Netw.
  contributor:
    fullname: Sriram
– volume: 64
  start-page: 107
  year: 2005
  ident: 10.1016/j.knosys.2017.07.005_bib0017
  article-title: Evolutionary tuning of multiple SVM parameters
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2004.11.022
  contributor:
    fullname: Friedrichs
– year: 2017
  ident: 10.1016/j.knosys.2017.07.005_bib0010
  article-title: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems
  publication-title: Neural Netw.
  contributor:
    fullname: Gauthama Raman
– ident: 10.1016/j.knosys.2017.07.005_bib0040
– volume: 18
  start-page: 178
  year: 2014
  ident: 10.1016/j.knosys.2017.07.005_bib0008
  article-title: A novel hybrid KPCA and SVM with GA model for intrusion detection
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2014.01.028
  contributor:
    fullname: Kuang
– year: 2007
  ident: 10.1016/j.knosys.2017.07.005_bib0047
  article-title: A hierarchical SOM-based intrusion detection system
  publication-title: Eng. Appl.
  contributor:
    fullname: Kayacik
– start-page: 5
  year: 2010
  ident: 10.1016/j.knosys.2017.07.005_bib0048
  article-title: Discriminative multinomial Naïve Bayes for network intrusion detection
  contributor:
    fullname: Panda
– year: 1973
  ident: 10.1016/j.knosys.2017.07.005_bib0039
  contributor:
    fullname: Berge
– volume: 19
  start-page: 105
  year: 2011
  ident: 10.1016/j.knosys.2017.07.005_bib0011
  article-title: A kernel fuzzy c-means clustering-based fuzzy support vector machine algorithm for classification problems with outliers or noises
  publication-title: IEEE Trans. Fuzzy Syst.
  doi: 10.1109/TFUZZ.2010.2087382
  contributor:
    fullname: Yang
– year: 2015
  ident: 10.1016/j.knosys.2017.07.005_bib0023
  article-title: Feature selection and parameter optimization of support vector machines based on modified cat swarm optimization
  publication-title: Int. J. Distrib.
  doi: 10.1155/2015/365869
  contributor:
    fullname: Lin
– volume: 36
  start-page: 11994
  year: 2009
  ident: 10.1016/j.knosys.2017.07.005_bib0001
  article-title: Intrusion detection by machine learning: a review
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2009.05.029
  contributor:
    fullname: Tsai
– volume: 42
  start-page: 8609
  year: 2015
  ident: 10.1016/j.knosys.2017.07.005_bib0044
  article-title: An intrusion detection system using network traffic profiling and online sequential extreme learning machine
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2015.07.015
  contributor:
    fullname: Singh
– volume: 141
  start-page: 79
  year: 2015
  ident: 10.1016/j.knosys.2017.07.005_bib0016
  article-title: Melt index prediction by least squares support vector machines with an adaptive mutation fruit fly optimization algorithm
  publication-title: Chemom. Intell. Lab. Syst.
  doi: 10.1016/j.chemolab.2014.12.007
  contributor:
    fullname: Wang
– year: 2000
  ident: 10.1016/j.knosys.2017.07.005_bib0030
  contributor:
    fullname: Christiannini
– volume: 40
  start-page: 1
  year: 2013
  ident: 10.1016/j.knosys.2017.07.005_bib0014
  article-title: Anomaly intrusion detection based on PLS feature extraction and core vector machine
  publication-title: Knowl. Based Syst.
  doi: 10.1016/j.knosys.2012.09.004
  contributor:
    fullname: Gan
– volume: 4
  start-page: 1
  year: 2010
  ident: 10.1016/j.knosys.2017.07.005_bib0049
  article-title: Application of variant of adaboost based machine learning algorithm in network intrusion detection
  publication-title: Int. J. Comput. Sci. Secur.
  contributor:
    fullname: Kshirsagar
– year: 2016
  ident: 10.1016/j.knosys.2017.07.005_bib0033
  article-title: Rough set-hypergraph-based feature selection approach for intrusion detection systems
  publication-title: Def. Sci.
  doi: 10.14429/dsj.66.10802
  contributor:
    fullname: Raman
– volume: 17
  start-page: 1795
  year: 2015
  ident: 10.1016/j.knosys.2017.07.005_bib0028
  article-title: Preclinical Diagnosis of Magnetic Resonance (MR) Brain Images via Discrete Wavelet Packet Transform with Tsallis Entropy and Generalized Eigenvalue Proximate Support Vector Machine (GEPSVM)
  publication-title: Entropy
  doi: 10.3390/e17041795
  contributor:
    fullname: Zhang
– volume: 30
  start-page: 625
  year: 2011
  ident: 10.1016/j.knosys.2017.07.005_bib0007
  article-title: Swarm intelligence in intrusion detection: a survey
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2011.08.009
  contributor:
    fullname: Kolias
– volume: 38
  start-page: 5197
  year: 2011
  ident: 10.1016/j.knosys.2017.07.005_bib0024
  article-title: Feature selection and parameter optimization for support vector machines: a new approach based on genetic algorithm with feature chromosomes
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2010.10.041
  contributor:
    fullname: Zhao
– volume: 4
  start-page: 716
  year: 2015
  ident: 10.1016/j.knosys.2017.07.005_bib0026
  article-title: Pathological brain detection in MRI scanning by wavelet packet Tsallis entropy and fuzzy support vector machine
  publication-title: Springerplus
  doi: 10.1186/s40064-015-1523-4
  contributor:
    fullname: Zhang
– volume: 31
  start-page: 231
  year: 2006
  ident: 10.1016/j.knosys.2017.07.005_bib0021
  article-title: A GA-based feature selection and parameters optimizationfor support vector machines
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2005.09.024
  contributor:
    fullname: Huang
– year: 2010
  ident: 10.1016/j.knosys.2017.07.005_bib0032
  article-title: Root mean square filter for noisy images based on hyper graph model
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2010.01.013
  contributor:
    fullname: Kannan
– volume: 0
  start-page: 1
  year: 2017
  ident: 10.1016/j.knosys.2017.07.005_bib0034
  article-title: Development of rough set – hypergraph technique for key feature identification in intrusion detection systems
  publication-title: Comput. Electr. Eng.
  contributor:
    fullname: Gauthama Raman
– year: 2004
  ident: 10.1016/j.knosys.2017.07.005_bib0029
  article-title: Classification of hyperspectral remote sensing images with support vector machines
  publication-title: IEEE Trans. Geosci.
  doi: 10.1109/TGRS.2004.831865
  contributor:
    fullname: Melgani
– volume: 40
  start-page: 239
  year: 2016
  ident: 10.1016/j.knosys.2017.07.005_bib0038
  article-title: Hypergraph based feature selection technique for medical diagnosis
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-016-0600-8
  contributor:
    fullname: Somu
– volume: 12
  start-page: 3014
  year: 2012
  ident: 10.1016/j.knosys.2017.07.005_bib0002
  article-title: A hybrid network intrusion detection system using simplified swarm optimization (SSO)
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2012.04.020
  contributor:
    fullname: Chung
– start-page: 101
  year: 2006
  ident: 10.1016/j.knosys.2017.07.005_bib0053
  contributor:
    fullname: Tsang
– volume: 40
  start-page: 2373
  year: 2007
  ident: 10.1016/j.knosys.2017.07.005_bib0046
  article-title: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
  publication-title: Pattern Recognit
  doi: 10.1016/j.patcog.2006.12.009
  contributor:
    fullname: Tsang
– volume: 21
  start-page: 58
  year: 2015
  ident: 10.1016/j.knosys.2017.07.005_bib0027
  article-title: Detection of Alzheimer's disease and mild cognitive impairment based on structural volumetric MR images using 3D-DWT and WTA-KSVM trained by PSOTVAC
  publication-title: Biomed. Signal Process. Control
  doi: 10.1016/j.bspc.2015.05.014
  contributor:
    fullname: Zhang
– volume: 239
  start-page: 180
  year: 2014
  ident: 10.1016/j.knosys.2017.07.005_bib0019
  article-title: Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy
  publication-title: Appl. Math. Comput.
  doi: 10.1016/j.amc.2014.04.039
  contributor:
    fullname: ling Chen
– year: 2009
  ident: 10.1016/j.knosys.2017.07.005_bib0041
  article-title: A detailed analysis of the KDD CUP 99 data set
  contributor:
    fullname: Tavallaee
– volume: 121
  start-page: 32
  year: 2017
  ident: 10.1016/j.knosys.2017.07.005_bib0009
  article-title: A novel outlier cluster detection algorithm without top-n parameter
  publication-title: Knowl. Based Syst
  doi: 10.1016/j.knosys.2017.01.013
  contributor:
    fullname: Huang
– volume: 2
  start-page: 1
  year: 2011
  ident: 10.1016/j.knosys.2017.07.005_bib0042
  article-title: LIBSVM
  publication-title: ACM Trans. Intell. Syst. Technol.
  doi: 10.1145/1961189.1961199
  contributor:
    fullname: Chang
– start-page: 103
  year: 2013
  ident: 10.1016/j.knosys.2017.07.005_bib0045
  contributor:
    fullname: de la Hoz
– volume: 8
  start-page: 1381
  year: 2008
  ident: 10.1016/j.knosys.2017.07.005_bib0018
  article-title: A distributed PSO–SVM hybrid system with feature selection and parameter optimization
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2007.10.007
  contributor:
    fullname: Huang
– volume: 3
  start-page: 1
  year: 2008
  ident: 10.1016/j.knosys.2017.07.005_bib0056
  article-title: An adaptive automatically tuning intrusion detection system
  publication-title: ACM Trans. Auton. Adapt. Syst.
  doi: 10.1145/1380422.1380425
  contributor:
    fullname: Yu
– volume: 5
  start-page: 4430
  year: 2012
  ident: 10.1016/j.knosys.2017.07.005_bib0015
  article-title: Annual electric load forecasting by a least squares support vector machine with a fruit fly optimization algorithm
  publication-title: Energies
  doi: 10.3390/en5114430
  contributor:
    fullname: Li
– start-page: 473
  year: 2008
  ident: 10.1016/j.knosys.2017.07.005_bib0052
  article-title: A New Intrusion Detection Method Based on BPSO-SVM
  contributor:
    fullname: Ma
– volume: 57
  start-page: 270
  year: 2013
  ident: 10.1016/j.knosys.2017.07.005_bib0022
  article-title: Facing the classification of binary problems with a GSA-SVM hybrid system
  publication-title: Math. Comput. Model.
  doi: 10.1016/j.mcm.2011.06.048
  contributor:
    fullname: Sarafrazi
– volume: 2016
  start-page: 1
  year: 2016
  ident: 10.1016/j.knosys.2017.07.005_bib0025
  article-title: A parallel genetic algorithm based feature selection and parameter optimization for support vector machine
  publication-title: Sci. Program.
  contributor:
    fullname: Chen
– volume: 2
  start-page: 33
  year: 2010
  ident: 10.1016/j.knosys.2017.07.005_bib0057
  article-title: A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
  publication-title: Doi.org.
  contributor:
    fullname: Abadeh
– year: 2016
  ident: 10.1016/j.knosys.2017.07.005_bib0043
  article-title: Data Mining: Practical machine learning tools and techniques
  publication-title: Morgan Kaufmann
  contributor:
    fullname: Witten
– year: 2016
  ident: 10.1016/j.knosys.2017.07.005_bib0035
  article-title: A computational model for ranking cloud service providers using hypergraph based techniques
  publication-title: Futur. Gener. Comput. Syst
  contributor:
    fullname: Nivethitha
– year: 1991
  ident: 10.1016/j.knosys.2017.07.005_bib0031
  contributor:
    fullname: Davis
– start-page: 1
  year: 2009
  ident: 10.1016/j.knosys.2017.07.005_bib0051
  article-title: A detailed analysis of the KDD CUP 99 data set
  contributor:
    fullname: Tavallaee
– volume: 17
  issue: 05
  year: 2007
  ident: 10.1016/j.knosys.2017.07.005_bib0004
  article-title: Russia accused of unleashing cyberwar to disable Estonia
  publication-title: The Guardian
  contributor:
    fullname: Traynor
– volume: 199
  start-page: 90
  year: 2016
  ident: 10.1016/j.knosys.2017.07.005_bib0020
  article-title: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2016.03.031
  contributor:
    fullname: Hosseini Bamakan
– volume: 18
  start-page: 2015
  issue: 5
  year: 2008
  ident: 10.1016/j.knosys.2017.07.005_bib0005
  article-title: Georgia President’s Web Site under DDoS Attack from Russian Hackers
  publication-title: Cit. dne
  contributor:
    fullname: Danchev
– year: 2017
  ident: 10.1016/j.knosys.2017.07.005_bib0037
  article-title: A rough set-based hypergraph trust measure parameter selection technique for cloud service selection
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-017-2032-8
  contributor:
    fullname: Somu
– volume: 4289
  start-page: 1
  year: 2014
  ident: 10.1016/j.knosys.2017.07.005_bib0003
  article-title: Cyber attacks on US companies in 2014
  publication-title: The Heritage Foundation
  contributor:
    fullname: Walters
– volume: 35
  start-page: 1817
  year: 2008
  ident: 10.1016/j.knosys.2017.07.005_bib0012
  article-title: Particle swarm optimization for parameter determination and feature selection of support vector machines
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2007.08.088
  contributor:
    fullname: Lin
– year: 2007
  ident: 10.1016/j.knosys.2017.07.005_bib0006
  contributor:
    fullname: Scarfone
– volume: 96
  start-page: 61
  year: 2016
  ident: 10.1016/j.knosys.2017.07.005_bib0013
  article-title: Evolving support vector machines using fruit fly optimization for medical data classification
  publication-title: Knowl. Based Syst.
  doi: 10.1016/j.knosys.2016.01.002
  contributor:
    fullname: Shen
SSID ssj0002218
Score 2.6270866
Snippet Realization of the importance for advanced tool and techniques to secure the network infrastructure from the security risks has led to the development of many...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 1
SubjectTerms Adaptive systems
Alarm systems
Artificial intelligence
Cybersecurity
Feature extraction
Feature subset
Genetic algorithm
Genetic algorithms
Graph theory
Hypergraph
Intrusion detection system
Intrusion detection systems
Kernel parameters
Machine learning
Optimization
Parameter optimization
Support vector machine
Support vector machines
Title An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine
URI https://dx.doi.org/10.1016/j.knosys.2017.07.005
https://www.proquest.com/docview/1966851321
Volume 134
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NTxsxELUgXHqh0A9BCWgOXN3s2t5N9hghohQEF4rEzbK9dtm22UQkVOqlP6S_lhmvF6lVpUocba3tlWc882zPPDN2GoqxKqUNfOIyz9XEBF5ZijK3ucutR0hr6Lzj6rqc36qLu-Jui531uTAUVplsf2fTo7VONaM0m6NV04xuEBygviJgQCWVgpL4duIl0YDtTD9dzq-fDbIQ8ZiPvufUoM-gi2Fe39rl-ifxdufjyOJJ79j920P9ZaujA5rtsd2EHGHa_dw-2_LtG_a6f5UB0iJ9y35PW_CRGAL9CTQtZVXg5EPtNzHsqoWOvRnIgdWA5Xvciz5E5mrgQDzUOAKY71-WD83mfgEIa4EYwhcUOQNLtDGLlLwJpq0h-MgNCuv4og7VNjjE44qAPfyIlwKwiCGb_h27nZ1_Ppvz9AIDd1KqDTfG5YJIuKrKKekCwiGX1dUEYZL3QhaqVCELzqpgMy-sKWspK-NVXVhDQFC-Z4N22foDBqGSsjCiRqOWKSfcJEjsF3eP0uQGMeUh4_2s61VHtKH7CLSvupOSJinpjG7Mi0M27kWj_1AYjb7gPy2HvSR1WrBrjYaoRPApRf7hxR0fsVdUIs-WF0M2QPn6Y4QsG3vCtj_-yk-SYj4BCB7vUA
link.rule.ids 315,783,787,4511,24130,27938,27939,45599,45693
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3BTtwwELUQHMqlUKDqwrbMgavZxHaymyNCrLYtcClI3CzbsSHAZlfsgsSlH9KvZcZJVFEhIfUYx7Ejz3jm2Z55ZuwgZEOVSxv4yCWeq5EJvLAUZW5Tl1qPkNbQfsfZeT65VD-usqsVdtzlwlBYZWv7G5serXVbMmhHczCvqsEvBAeorwgYUEmloCS-NUX8WajUh7__xnkIETf5qDan6l3-XAzyuqtni2di7U6HkcOTbrF72z_9Y6mj-xlvso8tboSj5tc-sRVfb7GN7k4GaKfoNvtzVIOPtBDoTaCqKacChx5Kv4xBVzU03M1A7qsEfL7BlehD5K0GDsRCjT2Aub-ePVTLmykgqAXiB59S3AzM0MJM29RNMHUJwUdmUFjE-3SotMIuHucE6-EpHgnANAZs-h12OT65OJ7w9v4F7qRUS26MSwVRcBWFU9IFBEMuKYsRgiTvhcxUrkISnFXBJl5Yk5dSFsarMrOGYKD8zFbrWe2_MAiFlJkRJZq0RDnhRkFiu7h2lCY1iCh7jHejrucNzYbu4s9udSMlTVLSCZ2XZz027ESjX6mLRk_wzpf9TpK6na4LjWYoR-gpRbr73w3vsw-Ti7NTffr9_OceW6c35OPSrM9WUdb-K4KXpf0WlfMFUYLwMg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+efficient+intrusion+detection+system+based+on+hypergraph+-+Genetic+algorithm+for+parameter+optimization+and+feature+selection+in+support+vector+machine&rft.jtitle=Knowledge-based+systems&rft.au=Gauthama+Raman%2C+M.R.&rft.au=Somu%2C+Nivethitha&rft.au=Kirthivasan%2C+Kannan&rft.au=Liscano%2C+Ramiro&rft.date=2017-10-15&rft.issn=0950-7051&rft.volume=134&rft.spage=1&rft.epage=12&rft_id=info:doi/10.1016%2Fj.knosys.2017.07.005&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_knosys_2017_07_005
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0950-7051&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0950-7051&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0950-7051&client=summon