The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mass of the training samples and setting parameters of SVM artificially will affect badly the efficiency to find an optimal decision hyper plane for SVM. In this paper, FCM clustering algorithm and heuristic PSO algorithm are applied to Intrusion Detection. FCM clustering algorithm is designed to help SVM to find the optimal training samples from vast amounts of data; heuristic PSO algorithm is designed...
The success of any Intrusion Detection Systems (IDSs) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with irrelevant and redundant features. How to choose the effective and key features is very important topic for an intrusion detection problem. Support vector machine (SVM) has been employed to provide potential solutions for the IDSs...
This paper mainly research on the application of the particle swarm optimization algorithm in anomaly detection, including the PSO algorithm combined with clustering method, PSO with neural networks, PSO with support vector machines and a single PSO algorithm. It analyzes the advantages and disadvantages of each algorithm, and presents the development of application of the particle swarm algorithm...
Because the network intrusion behaviors are characterized with uncertainty, complexity and diversity, a new method based on support vector regression (SVR) and particle swarm optimization algorithm (PSOA) is presented and used for pattern analysis of intrusion detection in this paper. The novel structure model has higher accuracy and faster convergence speed. We construct the network structure, and...
Intrusion detection plays more important role in network security today. This paper introduces a method, particle swarm optimization and support vector machine, to intrusion detection system, and presents a new design of ID Based on particle swarm optimization and support vector machine. This paper presents an optimal selection approach of the SVM parameters (regulation parameter C and the radial...
Intelligent algorithms being applied in intrusion detection system (IDS) becomes a tendency in recent years. This paper presents a new method of hybrid detection based on BPSO-SVM, a mixed algorithm that is composed of modified binary particle swarm optimization (BPSO) and support vector machine (SVM). This algorithm proposes a simultaneous feature selection and SVM parameters optimization. Experiments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.