Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 6
Page No. 1523 - 1537

A New Distributed Learning Based Algorithm for Network Intrusion Detection System

Authors : Aryan Mohammadi Pasikhani and Elankovan A. Sundararajan

References

Desale, K.S., C.N. Kumathekar and A.P. Chavan, 2015. Efficient intrusion detection system using stream data mining classification technique. Proceedings of the 2015 International Conference on Computing Communication Control and Automation (ICCUBEA), February 26-27, 2015, IEEE, New York, USA., ISBN:978-1-4799-6892-3, pp: 469-473.

Ghorbani, A.A., W. Lu and M. Tavallaee, 2009. Network Intrusion Detection and Prevention: Concepts and Techniques. Vol. 47, Springer, Berlin, Germany, ISBN:978-0-387-88770-8, Pages: 211.

Gong, W., W. Fu and L. Cai, 2010. A neural network based intrusion detection data fusion model. Proceedings of the 2010 Third International Joint Conference on Computational Science and Optimization (CSO), Vol. 2, May 28-31, 2010, IEEE, Huangshan, China, ISBN:978-1-4244-6812-6, pp: 410-414.

Gumus, F., C.O. Sakar, Z. Erdem and O. Kursun, 2014. Online naive bayes classification for network intrusion detection. Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 17-20, 2014, IEEE, Beijing, China, ISBN:978-1-4799-5878-8, pp: 670-674.

Koc, L., T.A. Mazzuchi and S. Sarkani, 2012. A network intrusion detection system based on a hidden naive bayes multiclass classifier. Expert Syst. Appl., 39: 13492-13500.
Direct Link  |  

Kumar, S. and A. Yadav, 2014. Increasing performance of intrusion detection system using neural network. Proceedings of the 2014 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), May 8-10, 2014, IEEE, Ramanathapuram, India, ISBN:978-1-4799-3915-2, pp: 546-550.

Lin, W.C., S.W. Ke and C.F. Tsai, 2015. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst., 78: 13-21.
Direct Link  |  

Lippmann, R.P., D.J. Fried, I. Graf, J.W. Haines and K.R. Kendall et al., 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), January 25-27, 2000, IEEE Computer Society Press, Los Alamitos, CA, pp: 12-26.

Malialis, K. and D. Kudenko, 2015. Distributed response to network intrusions using multiagent reinforcement learning. Eng. Appl. Artif. Intell., 41: 270-284.
Direct Link  |  

Pal, D. and A. Parashar, 2014. Improved genetic algorithm for intrusion detection system. Proceedings of the 2014 International Conference on Computational Intelligence and Communication Networks (CICN), November 14-16, 2014, IEEE, Bhopal, India, ISBN:978-1-4799-6930-2, pp: 835-839.

Paul, S., T. Makkar and K. Chandrasekaran, 2016. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems. In: Computational Intelligence, Cyber Security and Computational Models, Senthilkumar, M., V. Ramasamy, S. Sheen, C. Veeramani and A. Bonato et al., (Eds.). Springer, Singapore, pp: 335-348.

Rahmatian, M., H. Kooti, I.G. Harris and E. Bozorgzadeh, 2012. Hardware-assisted detection of malicious software in embedded systems. IEEE. Embedded Syst. Lett., 4: 94-97.
CrossRef  |  Direct Link  |  

Sahu, S.K. and S.K. Jena, 2016. A multiclass SVM classification approach for intrusion detection. Proceedings of the International Conference on Distributed Computing and Internet Technology, January 15-18, 2016, Springer, Bhubaneswar, India, pp: 175-181.

Shanmugavadivu, R. and N. Nagarajan, 2011. Network intrusion detection system using fuzzy logic. Indian J. Comput. Sci. Eng., 2: 101-111.
Direct Link  |  

Soni, M., M. Ahirwa and S. Agrawal, 2015. A survey on intrusion detection techniques in MANET. Proceedings of the 2015 International Conference on Computational Intelligence and Communication Networks (CICN), December 12-14, 2015, IEEE, Jabalpur, India, ISBN:978-1-5090-0077-7, pp: 1027-1032.

Wang, G., J. Hao, J. Ma and L. Huang, 2010. A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Applic., 37: 6225-6232.
CrossRef  |  Direct Link  |  

Wang, J., Q. Yang and D. Ren, 2009. An intrusion detection algorithm based on decision tree technology. Proceedings of the Asia-Pacific Conference on Information Processing APCIP-2009, Vol. 2, July 18-19, 2009, IEEE, Shenzhen, China, ISBN:978-0-7695-3699-6, pp: 333-335.

Wang, Y., 2008. Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. Information Science Reference, New York, USA., ISBN:978-1-59904-708-9, Pages: 395.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved