2012
DOI: 10.1007/978-3-642-34500-5_64
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Particle Swarm Optimization for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…The values were obtained under different types of datasets such as KDD, NSL‐KDD, and Reliability Lab Data 2009 datasets . Except for NB , the rest of data mining and machine learning‐based methods show good detection accuracy. Many hybrid classifiers succeed at achieving a high detection rate while keeping a low false positive.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The values were obtained under different types of datasets such as KDD, NSL‐KDD, and Reliability Lab Data 2009 datasets . Except for NB , the rest of data mining and machine learning‐based methods show good detection accuracy. Many hybrid classifiers succeed at achieving a high detection rate while keeping a low false positive.…”
Section: Resultsmentioning
confidence: 99%
“…Some fuzzy techniques have also been used to tackle the intrusion issue. Boughaci et al , proposed a fuzzy PSO algorithm (FPSO), which combines between fuzzy logic and PSO. The same authors also proposed a fuzzy genetic algorithm (FGA) , which improves the fuzzy rules by adding a genetic algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Yi et al use a combination of statistical methods and particle swarm optimization (PSO) in order to achieve fast feature selection and rule optimization. 18 Dalila Boughaci et al propose a Fuzzy Particle Optimization (FPSO) algorithm for intrusion detection using "if-then" fuzzy rules as a knowledge base for modeling and improved by PSO algorithm 19 .…”
Section: Intelligent Optimization Algorithmsmentioning
confidence: 99%
“…However, early and prompt detection of new and zero-day attacks is still a challenging area of research. Various machine learning techniques were applied for misuse-based detection [127,[391][392][393][394][395], anomaly-based detection [396][397][398][399] and hybrid-based detection [400][401][402][403][404]. Some papers summarized intrusion detection techniques and ML techniques in detail [3,73,77,[405][406][407][408][409][410][411][412][413].…”
Section: ) Trendsmentioning
confidence: 99%