2011
DOI: 10.1016/j.eswa.2010.12.006
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of genetic fuzzy systems for intrusion detection in computer networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(24 citation statements)
references
References 45 publications
0
23
0
1
Order By: Relevance
“…(Gomez et al, 2002) [18] first demonstrated the work of fuzzy classifiers on intrusion detection system. Various GA models such as Michigan, Pittsburgh and Iterative rule learning approaches along with different swarm intelligence techniques have been applied by [19].…”
Section: Related Workmentioning
confidence: 99%
“…(Gomez et al, 2002) [18] first demonstrated the work of fuzzy classifiers on intrusion detection system. Various GA models such as Michigan, Pittsburgh and Iterative rule learning approaches along with different swarm intelligence techniques have been applied by [19].…”
Section: Related Workmentioning
confidence: 99%
“…is a feature vector set of s dimensional pattern space, according to some similarity measure, the set is aggregated into C sub set 12 , , , n X X X , 2 cn . The C subset is a fuzzy partition of the feature vector set X, ik  indicates that the feature vector i x belongs to the membership degree of the subset k X , thus the fuzzy classification can be got.…”
Section: Fuzzy C-mean Methodsmentioning
confidence: 99%
“…But it needs to match the network data with all the rules, when the network traffic is very large, it is inevitable that there will be a phenomenon of data packets missing. [12] …”
Section: Intrusion Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Abadeh M S et al . [58] has proposed a design and analysis of genetic fuzzy systems for intrusion detection in computer networks. Performance of the proposed method is evaluated using detection rate and false positive rate parameters.…”
Section: Misuse Detectionmentioning
confidence: 99%