{"title":"基于混合SVM的改进型入侵检测算法","authors":"Vidhya Sathish, P. Khader","doi":"10.14257/IJSIA.2017.11.9.05","DOIUrl":null,"url":null,"abstract":"The blooming of intrusion instance trace notified as grim threat as per internet industry is concerned. To overcome, detection methodologies are designed by adopting an extensive intense research in the internet industry. Based on the consideration of challenging task and performance existence of contemporary computational methodologies, the objective of this Proposed Research has developed the enhanced hybrid strategy by combining the Support Vector Machine approach from classifier-based techniques and the Grey Wolf Optimizer from evolutionary techniques to optimize the support vector machine parameter towards the accurate classification of Host based intrusions with high detection accuracy and minimal false leads.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Improved Detecting Host Based Intrusions Based On Hybrid SVM Using Grey Wolf Optimizer\",\"authors\":\"Vidhya Sathish, P. Khader\",\"doi\":\"10.14257/IJSIA.2017.11.9.05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The blooming of intrusion instance trace notified as grim threat as per internet industry is concerned. To overcome, detection methodologies are designed by adopting an extensive intense research in the internet industry. Based on the consideration of challenging task and performance existence of contemporary computational methodologies, the objective of this Proposed Research has developed the enhanced hybrid strategy by combining the Support Vector Machine approach from classifier-based techniques and the Grey Wolf Optimizer from evolutionary techniques to optimize the support vector machine parameter towards the accurate classification of Host based intrusions with high detection accuracy and minimal false leads.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2017.11.9.05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.9.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improved Detecting Host Based Intrusions Based On Hybrid SVM Using Grey Wolf Optimizer
The blooming of intrusion instance trace notified as grim threat as per internet industry is concerned. To overcome, detection methodologies are designed by adopting an extensive intense research in the internet industry. Based on the consideration of challenging task and performance existence of contemporary computational methodologies, the objective of this Proposed Research has developed the enhanced hybrid strategy by combining the Support Vector Machine approach from classifier-based techniques and the Grey Wolf Optimizer from evolutionary techniques to optimize the support vector machine parameter towards the accurate classification of Host based intrusions with high detection accuracy and minimal false leads.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security