CINXE.COM
Recent Research Articles in Intrusion Detection | ijnsa
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width" /> <title>Recent Research Articles in Intrusion Detection | ijnsa</title> <link rel="profile" href="http://gmpg.org/xfn/11" /> <link rel="pingback" href="https://ijnsa2013.wordpress.com/xmlrpc.php" /> <!--[if lt IE 9]> <script src="https://s2.wp.com/wp-content/themes/pub/adelle/js/html5.js" type="text/javascript"></script> <![endif]--> <meta name='robots' content='max-image-preview:large' /> <link rel='dns-prefetch' href='//s1.wp.com' /> <link rel='dns-prefetch' href='//s2.wp.com' /> <link rel='dns-prefetch' href='//s0.wp.com' /> <link rel='dns-prefetch' href='//fonts-api.wp.com' /> <link rel='dns-prefetch' href='//s.pubmine.com' /> <link rel='dns-prefetch' href='//x.bidswitch.net' /> <link rel='dns-prefetch' href='//static.criteo.net' /> <link rel='dns-prefetch' href='//ib.adnxs.com' /> <link rel='dns-prefetch' href='//aax.amazon-adsystem.com' /> <link rel='dns-prefetch' href='//bidder.criteo.com' /> <link rel='dns-prefetch' href='//cas.criteo.com' /> <link rel='dns-prefetch' href='//gum.criteo.com' /> <link rel='dns-prefetch' href='//ads.pubmatic.com' /> <link rel='dns-prefetch' href='//gads.pubmatic.com' /> <link rel='dns-prefetch' href='//tpc.googlesyndication.com' /> <link rel='dns-prefetch' href='//ad.doubleclick.net' /> <link rel='dns-prefetch' href='//googleads.g.doubleclick.net' /> <link rel='dns-prefetch' href='//www.googletagservices.com' /> <link rel='dns-prefetch' href='//cdn.switchadhub.com' /> <link rel='dns-prefetch' href='//delivery.g.switchadhub.com' /> <link rel='dns-prefetch' href='//delivery.swid.switchadhub.com' /> <link rel='dns-prefetch' href='//a.teads.tv' /> <link rel='dns-prefetch' href='//prebid.media.net' /> <link rel='dns-prefetch' href='//adserver-us.adtech.advertising.com' /> <link rel='dns-prefetch' href='//fastlane.rubiconproject.com' /> <link rel='dns-prefetch' href='//prebid-server.rubiconproject.com' /> <link rel='dns-prefetch' href='//hb-api.omnitagjs.com' /> <link rel='dns-prefetch' href='//mtrx.go.sonobi.com' /> <link rel='dns-prefetch' href='//apex.go.sonobi.com' /> <link rel='dns-prefetch' href='//u.openx.net' /> <link rel="alternate" type="application/rss+xml" title="ijnsa » Feed" href="https://ijnsa2013.wordpress.com/feed/" /> <link rel="alternate" type="application/rss+xml" title="ijnsa » Comments Feed" href="https://ijnsa2013.wordpress.com/comments/feed/" /> <script type="text/javascript"> /* <![CDATA[ */ function addLoadEvent(func) { var oldonload = window.onload; if (typeof window.onload != 'function') { window.onload = func; } else { window.onload = function () { oldonload(); func(); } } } /* ]]> */ </script> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s0.wp.com\/wp-content\/mu-plugins\/wpcom-smileys\/twemoji\/2\/72x72\/","ext":".png","svgUrl":"https:\/\/s0.wp.com\/wp-content\/mu-plugins\/wpcom-smileys\/twemoji\/2\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/s2.wp.com\/wp-includes\/js\/wp-emoji-release.min.js?m=1719498190i&ver=6.8-alpha-59438"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link crossorigin='anonymous' rel='stylesheet' id='all-css-0-1' href='https://s0.wp.com/_static/??-eJx9zt0KwjAMBeAXsoZVRHYhPku2htI1/aHJGHt7qzc6BC+T8+UQ2KqZS1bKChMXbyqvPmSBrTSHTsBzmZDPs8gJvmxaPzI4TypAa09LDGQYN1BKlVFJQHRn+lfAIXa2kFaco3lPP/zwW8IWSUP2ZsIGnR43r+NHug83O17teBns8gRW61Vc&cssminify=yes' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-2-1' href='https://s0.wp.com/_static/??-eJydzMsOwiAQheEXEibEXtKF8VmATggVgcwMNby91U13LlyenHw/vKryJQtmgZpaiJkhtGM6pHA8hLCbRU96ANdiWsGl4h8qRUeWOrD0hNozX+Bn6KsYNpRqP9z20kQFiuu/CbISc+CT3583M1/NMg6zGbc3O1tP4A==&cssminify=yes' type='text/css' media='all' /> <style id='wp-block-library-inline-css'> .has-text-align-justify { text-align:justify; } .has-text-align-justify{text-align:justify;} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-4-1' href='https://s2.wp.com/_static/??-eJzTLy/QzcxLzilNSS3WzyrWz01NyUxMzUnNTc0rQeEU5CRWphbp5qSmJyZX6uVm5uklFxfr6OPTDpRD5sM02efaGpoZmFkYGRuZGmQBAHPvL0Y=&cssminify=yes' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-8-1' href='https://s1.wp.com/_static/??/wp-content/mu-plugins/core-compat/wp-mediaelement.css,/wp-content/mu-plugins/wpcom-bbpress-premium-themes.css?m=1432920480j&cssminify=yes' type='text/css' media='all' /> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--font-family--albert-sans: 'Albert Sans', sans-serif;--wp--preset--font-family--alegreya: Alegreya, serif;--wp--preset--font-family--arvo: Arvo, serif;--wp--preset--font-family--bodoni-moda: 'Bodoni Moda', serif;--wp--preset--font-family--bricolage-grotesque: 'Bricolage Grotesque', sans-serif;--wp--preset--font-family--cabin: Cabin, sans-serif;--wp--preset--font-family--chivo: Chivo, sans-serif;--wp--preset--font-family--commissioner: Commissioner, sans-serif;--wp--preset--font-family--cormorant: Cormorant, serif;--wp--preset--font-family--courier-prime: 'Courier Prime', monospace;--wp--preset--font-family--crimson-pro: 'Crimson Pro', serif;--wp--preset--font-family--dm-mono: 'DM Mono', monospace;--wp--preset--font-family--dm-sans: 'DM Sans', sans-serif;--wp--preset--font-family--dm-serif-display: 'DM Serif Display', serif;--wp--preset--font-family--domine: Domine, serif;--wp--preset--font-family--eb-garamond: 'EB Garamond', serif;--wp--preset--font-family--epilogue: Epilogue, sans-serif;--wp--preset--font-family--fahkwang: Fahkwang, sans-serif;--wp--preset--font-family--figtree: Figtree, sans-serif;--wp--preset--font-family--fira-sans: 'Fira Sans', sans-serif;--wp--preset--font-family--fjalla-one: 'Fjalla One', sans-serif;--wp--preset--font-family--fraunces: Fraunces, serif;--wp--preset--font-family--gabarito: Gabarito, system-ui;--wp--preset--font-family--ibm-plex-mono: 'IBM Plex Mono', monospace;--wp--preset--font-family--ibm-plex-sans: 'IBM Plex Sans', sans-serif;--wp--preset--font-family--ibarra-real-nova: 'Ibarra Real Nova', serif;--wp--preset--font-family--instrument-serif: 'Instrument Serif', serif;--wp--preset--font-family--inter: Inter, sans-serif;--wp--preset--font-family--josefin-sans: 'Josefin Sans', sans-serif;--wp--preset--font-family--jost: Jost, sans-serif;--wp--preset--font-family--libre-baskerville: 'Libre Baskerville', serif;--wp--preset--font-family--libre-franklin: 'Libre Franklin', sans-serif;--wp--preset--font-family--literata: Literata, serif;--wp--preset--font-family--lora: Lora, serif;--wp--preset--font-family--merriweather: Merriweather, serif;--wp--preset--font-family--montserrat: Montserrat, sans-serif;--wp--preset--font-family--newsreader: Newsreader, serif;--wp--preset--font-family--noto-sans-mono: 'Noto Sans Mono', sans-serif;--wp--preset--font-family--nunito: Nunito, sans-serif;--wp--preset--font-family--open-sans: 'Open Sans', sans-serif;--wp--preset--font-family--overpass: Overpass, sans-serif;--wp--preset--font-family--pt-serif: 'PT Serif', serif;--wp--preset--font-family--petrona: Petrona, serif;--wp--preset--font-family--piazzolla: Piazzolla, serif;--wp--preset--font-family--playfair-display: 'Playfair Display', serif;--wp--preset--font-family--plus-jakarta-sans: 'Plus Jakarta Sans', sans-serif;--wp--preset--font-family--poppins: Poppins, sans-serif;--wp--preset--font-family--raleway: Raleway, sans-serif;--wp--preset--font-family--roboto: Roboto, sans-serif;--wp--preset--font-family--roboto-slab: 'Roboto Slab', serif;--wp--preset--font-family--rubik: Rubik, sans-serif;--wp--preset--font-family--rufina: Rufina, serif;--wp--preset--font-family--sora: Sora, sans-serif;--wp--preset--font-family--source-sans-3: 'Source Sans 3', sans-serif;--wp--preset--font-family--source-serif-4: 'Source Serif 4', serif;--wp--preset--font-family--space-mono: 'Space Mono', monospace;--wp--preset--font-family--syne: Syne, sans-serif;--wp--preset--font-family--texturina: Texturina, serif;--wp--preset--font-family--urbanist: Urbanist, sans-serif;--wp--preset--font-family--work-sans: 'Work Sans', sans-serif;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;}.has-albert-sans-font-family{font-family: var(--wp--preset--font-family--albert-sans) !important;}.has-alegreya-font-family{font-family: var(--wp--preset--font-family--alegreya) !important;}.has-arvo-font-family{font-family: var(--wp--preset--font-family--arvo) !important;}.has-bodoni-moda-font-family{font-family: var(--wp--preset--font-family--bodoni-moda) !important;}.has-bricolage-grotesque-font-family{font-family: var(--wp--preset--font-family--bricolage-grotesque) !important;}.has-cabin-font-family{font-family: var(--wp--preset--font-family--cabin) !important;}.has-chivo-font-family{font-family: var(--wp--preset--font-family--chivo) !important;}.has-commissioner-font-family{font-family: var(--wp--preset--font-family--commissioner) !important;}.has-cormorant-font-family{font-family: var(--wp--preset--font-family--cormorant) !important;}.has-courier-prime-font-family{font-family: var(--wp--preset--font-family--courier-prime) !important;}.has-crimson-pro-font-family{font-family: var(--wp--preset--font-family--crimson-pro) !important;}.has-dm-mono-font-family{font-family: var(--wp--preset--font-family--dm-mono) !important;}.has-dm-sans-font-family{font-family: var(--wp--preset--font-family--dm-sans) !important;}.has-dm-serif-display-font-family{font-family: var(--wp--preset--font-family--dm-serif-display) !important;}.has-domine-font-family{font-family: var(--wp--preset--font-family--domine) !important;}.has-eb-garamond-font-family{font-family: var(--wp--preset--font-family--eb-garamond) !important;}.has-epilogue-font-family{font-family: var(--wp--preset--font-family--epilogue) !important;}.has-fahkwang-font-family{font-family: var(--wp--preset--font-family--fahkwang) !important;}.has-figtree-font-family{font-family: var(--wp--preset--font-family--figtree) !important;}.has-fira-sans-font-family{font-family: var(--wp--preset--font-family--fira-sans) !important;}.has-fjalla-one-font-family{font-family: var(--wp--preset--font-family--fjalla-one) !important;}.has-fraunces-font-family{font-family: var(--wp--preset--font-family--fraunces) !important;}.has-gabarito-font-family{font-family: var(--wp--preset--font-family--gabarito) !important;}.has-ibm-plex-mono-font-family{font-family: var(--wp--preset--font-family--ibm-plex-mono) !important;}.has-ibm-plex-sans-font-family{font-family: var(--wp--preset--font-family--ibm-plex-sans) !important;}.has-ibarra-real-nova-font-family{font-family: var(--wp--preset--font-family--ibarra-real-nova) !important;}.has-instrument-serif-font-family{font-family: var(--wp--preset--font-family--instrument-serif) !important;}.has-inter-font-family{font-family: var(--wp--preset--font-family--inter) !important;}.has-josefin-sans-font-family{font-family: var(--wp--preset--font-family--josefin-sans) !important;}.has-jost-font-family{font-family: var(--wp--preset--font-family--jost) !important;}.has-libre-baskerville-font-family{font-family: var(--wp--preset--font-family--libre-baskerville) !important;}.has-libre-franklin-font-family{font-family: var(--wp--preset--font-family--libre-franklin) !important;}.has-literata-font-family{font-family: var(--wp--preset--font-family--literata) !important;}.has-lora-font-family{font-family: var(--wp--preset--font-family--lora) !important;}.has-merriweather-font-family{font-family: var(--wp--preset--font-family--merriweather) !important;}.has-montserrat-font-family{font-family: var(--wp--preset--font-family--montserrat) !important;}.has-newsreader-font-family{font-family: var(--wp--preset--font-family--newsreader) !important;}.has-noto-sans-mono-font-family{font-family: var(--wp--preset--font-family--noto-sans-mono) !important;}.has-nunito-font-family{font-family: var(--wp--preset--font-family--nunito) !important;}.has-open-sans-font-family{font-family: var(--wp--preset--font-family--open-sans) !important;}.has-overpass-font-family{font-family: var(--wp--preset--font-family--overpass) !important;}.has-pt-serif-font-family{font-family: var(--wp--preset--font-family--pt-serif) !important;}.has-petrona-font-family{font-family: var(--wp--preset--font-family--petrona) !important;}.has-piazzolla-font-family{font-family: var(--wp--preset--font-family--piazzolla) !important;}.has-playfair-display-font-family{font-family: var(--wp--preset--font-family--playfair-display) !important;}.has-plus-jakarta-sans-font-family{font-family: var(--wp--preset--font-family--plus-jakarta-sans) !important;}.has-poppins-font-family{font-family: var(--wp--preset--font-family--poppins) !important;}.has-raleway-font-family{font-family: var(--wp--preset--font-family--raleway) !important;}.has-roboto-font-family{font-family: var(--wp--preset--font-family--roboto) !important;}.has-roboto-slab-font-family{font-family: var(--wp--preset--font-family--roboto-slab) !important;}.has-rubik-font-family{font-family: var(--wp--preset--font-family--rubik) !important;}.has-rufina-font-family{font-family: var(--wp--preset--font-family--rufina) !important;}.has-sora-font-family{font-family: var(--wp--preset--font-family--sora) !important;}.has-source-sans-3-font-family{font-family: var(--wp--preset--font-family--source-sans-3) !important;}.has-source-serif-4-font-family{font-family: var(--wp--preset--font-family--source-serif-4) !important;}.has-space-mono-font-family{font-family: var(--wp--preset--font-family--space-mono) !important;}.has-syne-font-family{font-family: var(--wp--preset--font-family--syne) !important;}.has-texturina-font-family{font-family: var(--wp--preset--font-family--texturina) !important;}.has-urbanist-font-family{font-family: var(--wp--preset--font-family--urbanist) !important;}.has-work-sans-font-family{font-family: var(--wp--preset--font-family--work-sans) !important;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-10-1' href='https://s0.wp.com/_static/??/wp-content/themes/pub/adelle/style.css,/wp-content/mu-plugins/jetpack-plugin/sun/_inc/genericons/genericons/genericons.css?m=1685112397j&cssminify=yes' type='text/css' media='all' /> <link rel='stylesheet' id='adelle-muli-css' href='https://fonts-api.wp.com/css?family=Muli%3A400%2C400italic&ver=6.8-alpha-59438' media='all' /> <link rel='stylesheet' id='adelle-lora-css' href='https://fonts-api.wp.com/css?family=Lora%3A400%2C400italic%2C700%2C700italic&ver=6.8-alpha-59438' media='all' /> <link rel='stylesheet' id='adelle-montserrat-css' href='https://fonts-api.wp.com/css?family=Montserrat%3A400%2C700&ver=6.8-alpha-59438' media='all' /> <link crossorigin='anonymous' rel='stylesheet' id='all-css-16-1' href='https://s0.wp.com/_static/??-eJx9y0EOwjAMRNELYaxKQYUF4ixpcEOQY0e1o6q3p+zKht18aR6uDZKKkzj6iyoZtj5hfBIzYZGE5huTwdqS1nMyO+GB1A6Ney5iuNDEmveZcX8d8h/KpMCaoheVn4CZY1m+9FHvQ7jcQriOQ3h/APvHQNs=&cssminify=yes' type='text/css' media='all' /> <link crossorigin='anonymous' rel='stylesheet' id='print-css-17-1' href='https://s1.wp.com/wp-content/mu-plugins/global-print/global-print.css?m=1465851035i&cssminify=yes' type='text/css' media='print' /> <style id='jetpack-global-styles-frontend-style-inline-css'> :root { --font-headings: unset; --font-base: unset; --font-headings-default: -apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif; --font-base-default: -apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,Oxygen-Sans,Ubuntu,Cantarell,"Helvetica Neue",sans-serif;} </style> <link crossorigin='anonymous' rel='stylesheet' id='all-css-20-1' href='https://s0.wp.com/_static/??-eJyNjcsKQjEMBX/ImlsQry7ET5GahrbXNCmmRfx7H7gRN+7OwGEGbs2hSifpUIdrPFIRg4V6C3j5MNgQqBoHk4HlcKUYYry/Z5G0RrMV/C06FUEwxRLYsSa1L/iR9Uz1mc0bSKznwK/DsR787Kd5P/ntbnkAuNBIYA==&cssminify=yes' type='text/css' media='all' /> <script type="text/javascript" id="wpcom-actionbar-placeholder-js-extra"> /* <![CDATA[ */ var actionbardata = {"siteID":"54868495","postID":"184","siteURL":"http:\/\/ijnsa2013.wordpress.com","xhrURL":"https:\/\/ijnsa2013.wordpress.com\/wp-admin\/admin-ajax.php","nonce":"f1f7d771d3","isLoggedIn":"","statusMessage":"","subsEmailDefault":"instantly","proxyScriptUrl":"https:\/\/s0.wp.com\/wp-content\/js\/wpcom-proxy-request.js?ver=20211021","shortlink":"https:\/\/wp.me\/P3IdNJ-2Y","i18n":{"followedText":"New posts from this site will now appear in your <a href=\"https:\/\/wordpress.com\/read\">Reader<\/a>","foldBar":"Collapse this bar","unfoldBar":"Expand this bar"}}; /* ]]> */ </script> <script type="text/javascript" id="jetpack-mu-wpcom-settings-js-before"> /* <![CDATA[ */ var JETPACK_MU_WPCOM_SETTINGS = {"assetsUrl":"https:\/\/s1.wp.com\/wp-content\/mu-plugins\/jetpack-mu-wpcom-plugin\/sun\/vendor\/automattic\/jetpack-mu-wpcom\/src\/build\/"}; /* ]]> */ </script> <script crossorigin='anonymous' type='text/javascript' src='https://s1.wp.com/_static/??/wp-content/js/rlt-proxy.js,/wp-content/blog-plugins/wordads-classes/js/cmp/v2/cmp-non-gdpr.js?m=1720530689j'></script> <script type="text/javascript" id="rlt-proxy-js-after"> /* <![CDATA[ */ rltInitialize( {"token":null,"iframeOrigins":["https:\/\/widgets.wp.com"]} ); /* ]]> */ </script> <link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://ijnsa2013.wordpress.com/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress.com" /> <link rel="canonical" href="https://ijnsa2013.wordpress.com/recent-research-articles-in-intrusion-detection/" /> <link rel='shortlink' href='https://wp.me/P3IdNJ-2Y' /> <link rel="alternate" type="application/json+oembed" href="https://public-api.wordpress.com/oembed/?format=json&url=https%3A%2F%2Fijnsa2013.wordpress.com%2Frecent-research-articles-in-intrusion-detection%2F&for=wpcom-auto-discovery" /><link rel="alternate" type="application/xml+oembed" href="https://public-api.wordpress.com/oembed/?format=xml&url=https%3A%2F%2Fijnsa2013.wordpress.com%2Frecent-research-articles-in-intrusion-detection%2F&for=wpcom-auto-discovery" /> <!-- Jetpack Open Graph Tags --> <meta property="og:type" content="article" /> <meta property="og:title" content="Recent Research Articles in Intrusion Detection" /> <meta property="og:url" content="https://ijnsa2013.wordpress.com/recent-research-articles-in-intrusion-detection/" /> <meta property="og:description" content="International Journal of Network Security & Its Applications (IJNSA) ISSN 0974 – 9330 (Online); 0975 – 2307 (Print) A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS Waleed Al Shehri…" /> <meta property="article:published_time" content="2019-06-21T09:48:06+00:00" /> <meta property="article:modified_time" content="2019-11-06T05:47:00+00:00" /> <meta property="og:site_name" content="ijnsa" /> <meta property="og:image" content="https://s0.wp.com/i/blank.jpg" /> <meta property="og:image:alt" content="" /> <meta property="og:locale" content="en_US" /> <meta property="fb:app_id" content="249643311490" /> <meta property="article:publisher" content="https://www.facebook.com/WordPresscom" /> <meta name="twitter:text:title" content="Recent Research Articles in Intrusion Detection" /> <meta name="twitter:card" content="summary" /> <!-- End Jetpack Open Graph Tags --> <link rel="shortcut icon" type="image/x-icon" href="https://s1.wp.com/i/favicon.ico" sizes="16x16 24x24 32x32 48x48" /> <link rel="icon" type="image/x-icon" href="https://s1.wp.com/i/favicon.ico" sizes="16x16 24x24 32x32 48x48" /> <link rel="apple-touch-icon" href="https://s2.wp.com/i/webclip.png" /> <link rel='openid.server' href='https://ijnsa2013.wordpress.com/?openidserver=1' /> <link rel='openid.delegate' href='https://ijnsa2013.wordpress.com/' /> <link rel="search" type="application/opensearchdescription+xml" href="https://ijnsa2013.wordpress.com/osd.xml" title="ijnsa" /> <link rel="search" type="application/opensearchdescription+xml" href="https://s1.wp.com/opensearch.xml" title="WordPress.com" /> <meta name="theme-color" content="#ffffff" /> <style type="text/css"> .recentcomments a { display: inline !important; padding: 0 !important; margin: 0 !important; } table.recentcommentsavatartop img.avatar, table.recentcommentsavatarend img.avatar { border: 0px; margin: 0; } table.recentcommentsavatartop a, table.recentcommentsavatarend a { border: 0px !important; background-color: transparent !important; } td.recentcommentsavatarend, td.recentcommentsavatartop { padding: 0px 0px 1px 0px; margin: 0px; } td.recentcommentstextend { border: none !important; padding: 0px 0px 2px 10px; } .rtl td.recentcommentstextend { padding: 0px 10px 2px 0px; } td.recentcommentstexttop { border: none; padding: 0px 0px 0px 10px; } .rtl td.recentcommentstexttop { padding: 0px 10px 0px 0px; } </style> <meta name="application-name" content="ijnsa" /><meta name="msapplication-window" content="width=device-width;height=device-height" /><meta name="msapplication-tooltip" content="International Journal of Network Security & Its Applications (IJNSA)" /><meta name="description" content="International Journal of Network Security & Its Applications (IJNSA) ISSN 0974 - 9330 (Online); 0975 - 2307 (Print) http://airccse.org/journal/ijnsa.html A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS Waleed Al Shehri Department of Computer Science, King Abdul-Aziz University, Jeddah, Saudi Arabia ABSTRACT The emergence of wireless sensor networks (WSNs) can be considered one of the most…" /> <script type="text/javascript"> /* <![CDATA[ */ var wa_smart = { 'network_id': 3905, 'site_id': 474853, 'page_id': 1572546, 'blog_id': 54868495, 'post_id': null, 'theme': 'pub/adelle', 'target': 'wp_blog_id=54868495;language=en', '_': { 'title': 'Advertisement', 'privacy_settings': 'Privacy Settings' }, 'top': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135099 }, 'inline': { 'enabled': false, 'adflow_enabled': true, 'format_id': 110354, 'max_slots': 20, 'max_blaze_slots': 20 }, 'belowpost': { 'enabled': false, 'adflow_enabled': true, 'format_id': 134071 }, 'bottom_sticky': { 'enabled': false, 'adflow_enabled': true, 'format_id': 117571 }, 'sidebar': { 'enabled': false, 'adflow_enabled': true, 'format_id': 134686 }, 'sidebar_sticky_right': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135281 }, 'gutenberg_rectangle': { 'enabled': false, 'adflow_enabled': true, 'format_id': 134788 }, 'gutenberg_leaderboard': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135073 }, 'gutenberg_mobile_leaderboard': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135098 }, 'gutenberg_skyscraper': { 'enabled': false, 'adflow_enabled': true, 'format_id': 135088 } }; wa_smart.cmd = []; /* ]]> */ </script> <script type="text/javascript"> function __ATA_CC() {var v = document.cookie.match('(^|;) ?personalized-ads-consent=([^;]*)(;|$)');return v ? 1 : 0;} var __ATA_PP = { 'pt': 2, 'ht': 0, 'tn': 'adelle', 'uloggedin': 0, 'amp': false, 'consent': __ATA_CC(), 'gdpr_applies': false, 'ad': { 'label': { 'text': 'Advertisements' }, 'reportAd': { 'text': 'Report this ad' } }, 'disabled_slot_formats': [], 'siteid': 8982, 'blogid': 54868495 }; var __ATA = __ATA || {}; __ATA.cmd = __ATA.cmd || []; __ATA.criteo = __ATA.criteo || {}; __ATA.criteo.cmd = __ATA.criteo.cmd || []; </script> <script type="text/javascript"> (function(){var g=Date.now||function(){return+new Date};function h(a,b){a:{for(var c=a.length,d="string"==typeof a?a.split(""):a,e=0;e<c;e++)if(e in d&&b.call(void 0,d[e],e,a)){b=e;break a}b=-1}return 0>b?null:"string"==typeof a?a.charAt(b):a[b]};function k(a,b,c){c=null!=c?"="+encodeURIComponent(String(c)):"";if(b+=c){c=a.indexOf("#");0>c&&(c=a.length);var d=a.indexOf("?");if(0>d||d>c){d=c;var e=""}else e=a.substring(d+1,c);a=[a.substr(0,d),e,a.substr(c)];c=a[1];a[1]=b?c?c+"&"+b:b:c;a=a[0]+(a[1]?"?"+a[1]:"")+a[2]}return a};var l=0;function m(a,b){var c=document.createElement("script");c.src=a;c.onload=function(){b&&b(void 0)};c.onerror=function(){b&&b("error")};a=document.getElementsByTagName("head");var d;a&&0!==a.length?d=a[0]:d=document.documentElement;d.appendChild(c)}function n(a){var b=void 0===b?document.cookie:b;return(b=h(b.split("; "),function(c){return-1!=c.indexOf(a+"=")}))?b.split("=")[1]:""}function p(a){return"string"==typeof a&&0<a.length} function r(a,b,c){b=void 0===b?"":b;c=void 0===c?".":c;var d=[];Object.keys(a).forEach(function(e){var f=a[e],q=typeof f;"object"==q&&null!=f||"function"==q?d.push(r(f,b+e+c)):null!==f&&void 0!==f&&(e=encodeURIComponent(b+e),d.push(e+"="+encodeURIComponent(f)))});return d.filter(p).join("&")}function t(a,b){a||((window.__ATA||{}).config=b.c,m(b.url))}var u=Math.floor(1E13*Math.random()),v=window.__ATA||{};window.__ATA=v;window.__ATA.cmd=v.cmd||[];v.rid=u;v.createdAt=g();var w=window.__ATA||{},x="s.pubmine.com"; w&&w.serverDomain&&(x=w.serverDomain);var y="//"+x+"/conf",z=window.top===window,A=window.__ATA_PP&&window.__ATA_PP.gdpr_applies,B="boolean"===typeof A?Number(A):null,C=window.__ATA_PP||null,D=z?document.referrer?document.referrer:null:null,E=z?window.location.href:document.referrer?document.referrer:null,F,G=n("__ATA_tuuid");F=G?G:null;var H=window.innerWidth+"x"+window.innerHeight,I=n("usprivacy"),J=r({gdpr:B,pp:C,rid:u,src:D,ref:E,tuuid:F,vp:H,us_privacy:I?I:null},"","."); (function(a){var b=void 0===b?"cb":b;l++;var c="callback__"+g().toString(36)+"_"+l.toString(36);a=k(a,b,c);window[c]=function(d){t(void 0,d)};m(a,function(d){d&&t(d)})})(y+"?"+J);}).call(this); </script> <script> var sas_fallback = sas_fallback || []; sas_fallback.push( { tag: "<div id="atatags-26942-{{unique_id}}"></div><script>__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 120,formFactor: \'001\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});</script>", type: 'belowpost' }, { tag: "<div id="atatags-26942-{{unique_id}}"></div><script>__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 310,formFactor: \'001\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});</script>", type: 'inline' }, { tag: "<div id="atatags-26942-{{unique_id}}"></div><script>__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 140,formFactor: \'003\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});</script>", type: 'sidebar' }, { tag: "<div id="atatags-26942-{{unique_id}}"></div><script>__ATA.cmd.push(function() {__ATA.initDynamicSlot({id: \'atatags-26942-{{unique_id}}\',location: 110,formFactor: \'002\',label: {text: \'Advertisements\',},creative: {reportAd: {text: \'Report this ad\',},privacySettings: {text: \'Privacy\',}}});});</script>", type: 'top' } ); </script> <script type="text/javascript"> window.doNotSellCallback = function() { var linkElements = [ 'a[href="https://wordpress.com/?ref=footer_blog"]', 'a[href="https://wordpress.com/?ref=footer_website"]', 'a[href="https://wordpress.com/?ref=vertical_footer"]', 'a[href^="https://wordpress.com/?ref=footer_segment_"]', ].join(','); var dnsLink = document.createElement( 'a' ); dnsLink.href = 'https://wordpress.com/advertising-program-optout/'; dnsLink.classList.add( 'do-not-sell-link' ); dnsLink.rel = 'nofollow'; dnsLink.style.marginLeft = '0.5em'; dnsLink.textContent = 'Do Not Sell or Share My Personal Information'; var creditLinks = document.querySelectorAll( linkElements ); if ( 0 === creditLinks.length ) { return false; } Array.prototype.forEach.call( creditLinks, function( el ) { el.insertAdjacentElement( 'afterend', dnsLink ); }); return true; }; </script> <script type="text/javascript"> window.google_analytics_uacct = "UA-52447-2"; </script> <script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-52447-2']); _gaq.push(['_gat._anonymizeIp']); _gaq.push(['_setDomainName', 'wordpress.com']); _gaq.push(['_initData']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(ga); })(); </script> </head> <body class="page-template-default page page-id-184 customizer-styles-applied jetpack-reblog-enabled has-marketing-bar has-marketing-bar-theme-adelle"> <div id="wrapper" class="site-container"> <div id="page" class="hfeed site"> <header id="masthead" class="site-header" role="banner"> <hgroup> <h1 class="site-title"><a href="https://ijnsa2013.wordpress.com/" title="ijnsa" rel="home">ijnsa</a></h1> <h2 class="site-description">International Journal of Network Security & Its Applications (IJNSA)</h2> </hgroup> <nav id="site-navigation" class="navigation-main" role="navigation"> <h1 class="menu-toggle">Menu</h1> <div class="screen-reader-text skip-link"><a href="#content" title="Skip to content">Skip to content</a></div> <div class="menu"><ul> <li ><a href="https://ijnsa2013.wordpress.com/">Home</a></li><li class="page_item page-item-1"><a href="https://ijnsa2013.wordpress.com/about/">Current Issue</a></li> <li class="page_item page-item-224"><a href="https://ijnsa2013.wordpress.com/most-cited-articles/">Most Cited Articles</a></li> <li class="page_item page-item-184 current_page_item"><a href="https://ijnsa2013.wordpress.com/recent-research-articles-in-intrusion-detection/" aria-current="page">Recent Research Articles in Intrusion Detection</a></li> <li class="page_item page-item-63"><a href="https://ijnsa2013.wordpress.com/top-10-cited-papers/">Top 10 Cited Papers</a></li> <li class="page_item page-item-216"><a href="https://ijnsa2013.wordpress.com/top-2-cited-papers-in-2017/">TOP 2 CITED PAPERS IN 2017</a></li> <li class="page_item page-item-235"><a href="https://ijnsa2013.wordpress.com/top-cited-network-security-articles-part-1/">Top cited Network Security Articles- Part 1</a></li> </ul></div> </nav><!-- #site-navigation --> </header><!-- #masthead --> <div id="main" class="site-main"> <div id="primary" class="content-area"> <div id="content" class="site-content" role="main"> <article id="post-184" class="post-184 page type-page status-publish hentry"> <header class="entry-header"> <h1 class="entry-title">Recent Research Articles in Intrusion Detection</h1> </header><!-- .entry-header --> <div class="entry-content"> <h3 style="text-align:center;"><span style="color:#ff0000;"><strong>International Journal of Network Security & Its Applications (IJNSA) </strong></span></h3> <p style="text-align:center;">ISSN 0974 – 9330 (Online); 0975 – 2307 (Print)</p> <p style="text-align:center;"><a href="http://airccse.org/journal/ijnsa.html">http://airccse.org/journal/ijnsa.html</a></p> <h3 style="text-align:center;"><span style="color:#993300;"><strong>A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS</strong></span></h3> <p style="text-align:center;"><strong>Waleed Al Shehri</strong></p> <p style="text-align:center;"><strong>Department of Computer Science, King Abdul-Aziz University, Jeddah, Saudi Arabia</strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>ABSTRACT </strong></span></h3> <p style="text-align:justify;">The emergence of wireless sensor networks (WSNs) can be considered one of the most important revolutions in the field of information and communications technology (ICT). Recently, there has been a dramatic increase in the use of WSN applications such as surveillance systems, battleground applications, object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in such applications. As a result, many solutions and approaches have been proposed for different attacks and vulnerabilities to achieve security requirements. This paper surveys different security approaches for WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths and weaknesses for each technique are also discussed at the conclusion of this paper.</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>KEYWORDS </strong></span></h3> <p style="text-align:justify;">Wireless sensor networks; network security; cryptography; intrusion detection;</p> <p style="text-align:justify;"><strong>For More Details : <a href="http://aircconline.com/ijnsa/V9N1/9117ijnsa03.pdf">http://aircconline.com/ijnsa/V9N1/9117ijnsa03.pdf</a></strong></p> <p style="text-align:justify;"><strong>Volume Link : <a href="http://airccse.org/journal/jnsa17_current.html">http://airccse.org/journal/jnsa17_current.html</a> </strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>REFERENCES</strong></span></h3> <p style="text-align:justify;">[1] Kifayat, K., et al., Security in wireless sensor networks, in Handbook of Information and Communication Security. 2010, Springer. p. 513-552.</p> <p style="text-align:justify;">[2] Arampatzis, T., J. Lygeros, and S. Manesis. <strong><a href="https://www.researchgate.net/profile/Stamatis_Manesis/publication/4156082_A_Survey_of_Applications_of_Wireless_Sensors_and_Wireless_Sensor_Networks/links/0a85e52d92d8100b85000000.pdf">A survey of applications of wireless sensors and wireless sensor networks</a></strong>. in Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005. 2005. IEEE.</p> <p style="text-align:justify;">[3] Ko, J., et al., Wireless sensor networks for healthcare. Proceedings of the IEEE, 2010. 98(11): p.1947-1960.</p> <p style="text-align:justify;">[4] Panda, M. Data security in wireless sensor networks via AES algorithm. in Intelligent Systems and Control (ISCO), 2015 IEEE 9th International Conference on. 2015. IEEE.</p> <p style="text-align:justify;">[5] Sekhar, V.C. and M. Sarvabhatla. Security in wireless sensor networks with public key techniques. In Computer Communication and Informatics (ICCCI), 2012 International Conference on. 2012. IEEE.</p> <p style="text-align:justify;">[6] Praveena, A. and S. Smys. Efficient cryptographic approach for data security in wireless sensor networks using MES VU. in Intelligent Systems and Control (ISCO), 2016 10th International Conference on. 2016. IEEE.</p> <p style="text-align:justify;">[7] Jain, A., K. Kant, and M. Tripathy. Security solutions for wireless sensor networks. in 2012 Second International Conference on Advanced Computing & Communication Technologies. 2012. IEEE.</p> <p style="text-align:justify;">[8] Navin, A.H., et al. Encrypted Tag by Using Data-Oriented Random Number Generator to Increase Security in Wireless Sensor Network. in Computational Intelligence and Communication Networks (CICN), 2010 International Conference on. 2010. IEEE.</p> <p style="text-align:justify;">[9] Biswas, K., V. Muthukkumarasamy, and K. Singh, <strong><a href="https://www.researchgate.net/profile/Kamanashis_Biswas/publication/269875762_An_Encryption_Scheme_Using_Chaotic_Map_and_Genetic_Operations_for_Wireless_Sensor_Networks/links/5498e0bf0cf2519f5a1dea80.pdf">An encryption scheme using chaotic map and genetic operations for wireless sensor networks</a></strong>. IEEE Sensors Journal, 2015. 15(5): p. 2801-2809.</p> <p style="text-align:justify;">[10] Celestine, J., et al. An energy efficient flooding protocol for enhanced security in Wireless Sensor Networks. in Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island.2015. IEEE.</p> <p style="text-align:justify;">[11] Prathap, U., P.D. Shenoy, and K. Venugopal. <a href="http://eprints-bangaloreuniversity.in/6702/1/prathap2016.pdf"><strong>CMNTS: Catching malicious nodes with trust support in wireless sensor networks. in Region 10 Symposium (TENSYMP)</strong>,</a> 2016 IEEE. 2016. IEEE.</p> <p style="text-align:justify;">[12] Markert, J. and M. Massoth. Honeypot framework for wireless sensor networks. in Proceedings of International Conference on Advances in Mobile Computing & Multimedia. 2013. ACM.</p> <p style="text-align:justify;">[13] Abduvaliyev, A., et al., <strong><a href="http://staff.iium.edu.my/sakib/ndclab/papers/ieee_survey-WSN.pdf">On the vital areas of intrusion detection systems in wireless sensor networks</a></strong>. IEEE Communications Surveys & Tutorials, 2013. 15(3): p. 1223-1237.</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>AUTHORS</strong></span></h3> <p style="text-align:justify;">Waleed Al Shehri received his bachelor degree in computer science from King Abdulaziz University, Jeddah, Saudi Arabia(2005), MSc degree in information technology form Macquarie university, Sydney, Australia (2011) and now doing a PhD in computer science. His current research interests in cloud computing, big data and software engineering. Currently working in the Department of IT in Royal Saudi Air Force (RSAF).<strong> </strong></p> <h3 style="text-align:center;"><span style="color:#993300;"><strong>EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS</strong></span></h3> <p style="text-align:center;"><strong>HidemaTanaka</strong></p> <p style="text-align:center;"><strong>National Defense Academy of Japan Hashirimizu 1-10-20 Yokosuka, Kanagawa Japan 239-8686.</strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>ABSTRACT </strong></span></h3> <p style="text-align:justify;">We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection System(IDS). We shall analyze effectiveness and weakness using our proposal method as an example, and derive new attack scenario. Development of anomaly-based IDS is necessary for correspondence to a high network attack, however, we shall show that it makes new different problems at the same time. In this paper, we shall discuss some attack scenario which makes invalidate our detection. As the result, we conclude that it is difficult to prevent such attacks technically, and security requirements for operation side become serious.</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>KEYWORDS </strong></span></h3> <p style="text-align:justify;">Anomaly-based intrusion detection system, Automated IDS, Discrete Fourier Transform, Spectrum analysis, Kyoto2006+ dataset</p> <p style="text-align:justify;"><strong>For More Details : <a href="http://aircconline.com/ijnsa/V9N6/9617ijnsa01.pdf">http://aircconline.com/ijnsa/V9N6/9617ijnsa01.pdf</a></strong></p> <p style="text-align:justify;"><strong>Volume Link : <a href="http://airccse.org/journal/jnsa17_current.html">http://airccse.org/journal/jnsa17_current.html</a></strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>REFERENCES</strong></span></h3> <p style="text-align:justify;">[1] G.Bruneau. The history and evaluation of intrusion detection. SANS Institute Reading Room, <strong><a href="https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusion-detection-344">https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusion-detection-344</a></strong>, 2001.</p> <p style="text-align:justify;">[2] M.A.Alia, A.A.Hnaif, H.K.Al-Anie, K.A.Maria, A.M.Manasrah and M.I. Sarwar. <strong><a href="https://arxiv.org/pdf/1108.1417">A novel header matching algorithm for intrusion detection systems</a></strong> International Journal of Network Security and Its Applications. vol.3, No.4, 2011.</p> <p style="text-align:justify;">[3] A.V.Aho and M.J.Corasick. <strong><a href="http://celene.univ-orleans.fr/pluginfile.php/215224/mod_resource/content/1/StringMatching.pdf">Efficient string matching: An aid to bibliographic search</a></strong>. Communications of the ACM, vol.18(6), pp.333-340, 1975.</p> <p style="text-align:justify;">[4] P.Barford, J.Kline, D.Plonka and A.Ron. <strong><a href="http://cs.cmu.edu/~srini/15-744/readings/BKPR02.pdf">A signal analysis of network traffic anomalies</a></strong>. In Proceedings of Internet Measurement Workshop, pp.71-82, 2002.</p> <p style="text-align:justify;">[5] B.Commentz-Walter. A string matching algorithm fast on the average. InProceedings of International Colloquium on Automata, Languages and Programming (ICALP), pp.118- 132, 1979.</p> <p style="text-align:justify;">[6] E.Chimedtseren, K.Iwai, H.Tanaka and T.Kurokawa. Intrusion detection system using Discrete Fourier Transform. In Proceedings of Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA2014)pp.1-5, 2014.</p> <p style="text-align:justify;">[7] F.J.Harris. <strong><a href="https://apps.dtic.mil/dtic/tr/fulltext/u2/a034956.pdf">On the use of windows for harmonic analysis with the discrete Fourier transform</a></strong>. In Proceedings of the IEEE, vol.66, no.1, pp.51-83, 1978.</p> <p style="text-align:justify;">[8] S.S.Kim, A.L.Narasimha Reddy and M.Vannucci. <strong><a href="https://link.springer.com/content/pdf/10.1007/978-3-540-24693-0_86.pdf">Detecting traffic anomalies through aggregate analysis of packet header data</a></strong>. In Networking 2004 Springer Lecture Notes in Computer Science 3042, pp.1057-1059, 2004.</p> <p style="text-align:justify;">[9] C.Kreibich and J.Crowcroft. <strong><a href="http://dpnm.postech.ac.kr/research/04/nsri/papers/honypot.pdf">Honeycomb: Creating intrusion detection signatures using honeypots</a></strong>. ACM SIGCOMM Computer Communication Review vol.34(1), pp.51-56, 2004.</p> <p style="text-align:justify;">[10] K.Imai,S.AokiandT.Miyamoto. Anomaly detection based on clustering of network traffic characteristics considering results go signature base IDS evaluation. ICISS Technical Report vol.489, no.114, pp.7-12, 2015.</p> <p style="text-align:justify;">[11] M.Sato, H.Yamaki and H.Takakura. Unknown attacks detection using feature extraction from anomaly-based ids alerts. In Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12<sup>th</sup> International Symposium on IEEE, 2012 pp. 273-277, 2012.</p> <p style="text-align:justify;">[12] K.Skinner and A.Valdes. Adaptive model based monitoring for cyber-attack detection In Recent Advances in Intrusion Detection 2000 Springer Lecture Notes in Computer Science 1907, pp.80-92, 2000.</p> <p style="text-align:justify;">[13] J.Song, H.Takakura, Y.Okabe, M.Eto, D.Inoue, and K.Nakao. <strong><a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.800.3697&rep=rep1&type=pdf#page=40">Statistical analysis of honey pot data and building of Kyoto 2006+ dataset for NIDS evaluation</a></strong>. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security ACM, 2011, pp.29-36, 2011.</p> <p style="text-align:justify;">[14] Y.Tsuge and H.Tanaka. Intrusion detection system using discrete Fourier transform with window function International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, pp.23-34, 2016.</p> <p style="text-align:justify;">[15] Y.Tsuge and H.Tanaka. Intrusion detection system with spectrum quantification analysis International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4), pp.197- 207, 2016.</p> <p style="text-align:justify;">[16] S.K.Wagh, V.K.Pachghare and S.R.Kolhe. Survey: Learning techniques for intrusion detection system. International Journal of Advance Foundation and Research in Computer vol.1, issue 2, pp.21- 28, 2014.</p> <p style="text-align:justify;">[17] K.Wang and S.J.Stolfo. <strong><a href="https://academiccommons.columbia.edu/doi/10.7916/D8Z325FD/download">Anomalous payload based network intrusion detection</a></strong>. In International Workshop on Recent Advances in Intrusion Detection (RAID) Springer Lecture Notes in ComputerScience 3224, pp.203-222, 2004.</p> <p style="text-align:justify;">[18] M.Zhou and S.D.Lang. <strong><a href="http://www.cs.ucf.edu/csdept/faculty/lang/pubs/mzhousci2003final.pdf">A frequency-based approach to intrusion detection</a></strong>. In Proceedings of the Workshop on Network Security Threats and Countermeasures 2003.</p> <p style="text-align:justify;">[19] Traffic Data from Kyoto University’s Honeypots. <strong><a href="http://www.takakura.com/Kyoto%20data/">http://www.takakura.com/Kyoto data/</a>.</strong></p> <p style="text-align:justify;">[20] The bro network security monitor. <strong><a href="https://www.bro.org/">https://www.bro.org/</a></strong>.</p> <p style="text-align:justify;">[21] Logsurfer. <strong><a href="https://www.cert.dfn.de/eng/logsurf/">https://www.cert.dfn.de/eng/logsurf/</a>.</strong></p> <p style="text-align:justify;">[22] OSTINATO Network Traffic Generator and Analyzer. <strong><a href="http://ostinato.org">http://ostinato.org</a>.</strong></p> <p style="text-align:justify;">[23] Snort. <strong><a href="https://www.snort.org/">https://www.snort.org/</a></strong>.</p> <p style="text-align:justify;">[24] Swatch. <strong><a href="https://www.swatch.sourceforge.net/">https://www.swatch.sourceforge.net/</a></strong>.</p> <p style="text-align:justify;">[25] wireshark. <strong><a href="https://www.wireshark.org/download.html">https://www.wireshark.org/download.html</a></strong>.</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>AUTHOR</strong><strong> </strong></span></h3> <p style="text-align:justify;">Hidema Tanka is an associate professor of National Defense Academy Japan. His main research area is analysis of cryptographic algorithm, code theory, information security and cyber warfare. and its domestic laws.</p> <h3 style="text-align:center;"><span style="color:#993300;"><strong>PERFORMANCE EVALUATION OF J48 AND BAYES ALGORITHMS FOR INTRUSION DETECTION SYSTEM</strong></span></h3> <p style="text-align:center;"><strong><sup>1</sup>Uzair Bashir & <sup>2</sup>Manzoor Chachoo</strong></p> <p style="text-align:center;"><strong><sup>1</sup>Mewar University,Chittorgarh, Rajasthan,India <sup>2</sup>University of Kashmir,Srinagar, India</strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>ABSTRACT</strong></span></h3> <p style="text-align:justify;">Recent advances in the field of Artificial Intelligence has urged many security experts to follow this novel area. Extensive work has already been done, and much more efforts are being put to use the techniques of AI to improve the real time security. With lot of algorithms and techniques already in the market, it has become quite difficult to choose a particular algorithm,judging the fact that none proves to be accurate and efficient than the others. During the detailed study of major machine learning algorithms, we found certain algorithms more accurate than the other. In this paper, we have chosen two different techniques of differentiating the normal traffic from the intrusions. The results show J48 more efficient and accurate than the Naïve Bayes algorithm.</p> <h3 style="text-align:justify;"><span style="color:#333399;">INDEX TERMS</span></h3> <p style="text-align:justify;">Intrusion, IPV4, techniques, Bayes, Tree, Classification.</p> <p style="text-align:justify;"><strong>For More Details : <a href="http://aircconline.com/ijnsa/V9N4/9417ijnsa01.pdf">http://aircconline.com/ijnsa/V9N4/9417ijnsa01.pdf</a></strong></p> <p style="text-align:justify;"><strong>Volume Link : <a href="http://airccse.org/journal/jnsa17_current.html">http://airccse.org/journal/jnsa17_current.html</a></strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>REFERENCES</strong></span></h3> <p style="text-align:justify;">[1] CONNOLLY, P. J., 2001. Security protects bottom line. InfoWorld, Vol. 23, No. 15, p. 47</p> <p style="text-align:justify;">[2] SAKURAI, K., & Kim, T. H. (2008). A Trend in IDS researches. 보안공학연구논문지제권제호년월 (Journal of Security Engineering), 5(4), 8.</p> <p style="text-align:justify;">[3] Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., & Srivastava, J. (2003). <strong><a href="https://pdfs.semanticscholar.org/c6f7/ef944559f7cd0cefa58328a02abe72ddacb2.pdf">A comparative study of anomaly detection schemes in network intrusion detection</a></strong>. Proc. SIAM.</p> <p style="text-align:justify;">[4] Mathew, D. (2002). Choosing an intrusion detection system that best suits your organization. GSEC Practical v1. 4b, available at: www. Sans. org/reading_room/whitepapers/detection</p> <p style="text-align:justify;">[5] Brown, D. J., Suckow, B., & Wang, T. (2002). A survey of intrusion detection systems. Department of Computer Science, University of California, San Diego.</p> <p style="text-align:justify;">[6] Grandison, T., & Terzi, E. (2009). Intrusion Detection Technology.</p> <p style="text-align:justify;">[7] Beigh, B. M., & Peer, M. A. (2011). <strong><a href="http://www.ejournalofscience.org/archive/vol2no7/vol2no7_17.pdf">Intrusion Detection and Prevention System: Classification and Quick</a>.</strong></p> <p style="text-align:justify;">[8] Kovacich, G. L. (2003). <strong><a href="http://banksmillersupply.com/the-information-systems-security-officers-guide-establishing-and-managing-an-information-protectio-us-pdf-allbooks-gerald-l-kovacich.pdf">The Information Systems Security Officer’s Guide: Establishing and </a><a href="http://banksmillersupply.com/the-information-systems-security-officers-guide-establishing-and-managing-an-information-protectio-us-pdf-allbooks-gerald-l-kovacich.pdf">managing an information protection program</a></strong>. Butterworth-Heinemann.</p> <p style="text-align:justify;">[9] Huang, Y. A., & Lee, W. (2003, October). <strong><a href="http://www.cc.gt.atl.ga.us/~wenke/papers/sasn.pdf">A cooperative intrusion detection system for ad hoc networks</a></strong>. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 135-147). ACM.</p> <p style="text-align:justify;">[10] Cavusoglu, H., Mishra, B., &Raghunathan, S. (2004). <strong><a href="http://utd.edu/~huseyin/paper/investment.pdf">A model for evaluating IT security investments</a></strong>. Communications of the ACM, 47(7), 87-92.</p> <p style="text-align:justify;">[11] Banerjee, U., & Arya, K. V. (2013). <strong><a href="https://pdfs.semanticscholar.org/8da4/ded826abff56bddb5eba20835bf6ea684f7f.pdf">Optimizing Operating Cost of an Intrusion Detection</a></strong> System. International Journal of Communications, Network and System Sciences, 6(1).</p> <p style="text-align:justify;">[12] Cohen, G., Meiseles, M., &Reshef, E. (2012). U.S. Patent No. 8,099,760. Washington, DC: U.S. Patent and Trademark Office</p> <p style="text-align:justify;">[13] Amoroso, E., &Kwapniewski, R. (1998, December). A selection criteria for intrusion detection systems. In Computer Security Applications Conference, 1998. Proceedings. 14th Annual (pp. 280-288). IEEE.</p> <p style="text-align:justify;">[14] Chaudhary, A., V. N. Tiwari, and A. Kumar. “<strong><a href="https://pdfs.semanticscholar.org/1bed/1c2d5785f393b460b90bac27855b22f7bce8.pdf">Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks</a></strong>.” BharatiVidyapeeth’s Institute of Computer Applications and Management (BVICAM) 6.1 (2014): 690-696.</p> <p style="text-align:justify;">[15] Beigh, Bilal Maqbool. “One-stop: A novel hybrid model for intrusion detection system.”Computing for Sustainable Global Development (INDIACom), 2014 International Conference on. IEEE, 2014.</p> <p style="text-align:justify;">[16] Mitra, Sulata, and ArkadeepGoswami. “Load Balancing in Integrated MANET, WLAN and Cellular Network.” BharatiVidyapeeth’s Institute of Computer Applications and Management (2011): 304.</p> <p style="text-align:justify;">[17] Witten, Ian H., and Eibe Frank. <strong><a href="http://thuvien.thanglong.edu.vn:8081/dspace/bitstream/DHTL_123456789/4050/1/Data%20mining-1.pdf">Data Mining: Practical machine learning tools and techniques</a></strong>. Morgan Kaufmann, 2005.</p> <p style="text-align:justify;">[18] Moskovitch, Robert, et al. “<strong><a href="http://medinfo.ise.bgu.ac.il/medLab/MembersHomePages/RobPapers/Moskovitch.UWuSVM-AL.KI2007.pdf">Improving the detection of unknown computer worms activity using active learning</a>.</strong>” KI 2007: Advances in Artificial Intelligence. Springer Berlin Heidelberg, 2007. 489-493.</p> <p style="text-align:justify;">[19] Kotsiantis, Sotiris B., I. Zaharakis, and P. Pintelas. “<strong><a href="http://www.informatica.si/index.php/informatica/article/viewFile/148/140">Supervised machine learning: A review of classification techniques</a></strong>.” (2007): 3-24.</p> <p style="text-align:justify;">[20] Han, Hui, et al. “<strong><a href="http://clgiles.ist.psu.edu/papers/JCDL-2004-author-disambiguation.pdf">Two supervised learning approaches for name disambiguation in author citations</a></strong>.” Digital Libraries, 2004. Proceedings of the 2004 Joint ACM/IEEE Conference on. IEEE, 2004.</p> <p style="text-align:justify;">[21] Irani, Keki B. “<strong><a href="https://trs.jpl.nasa.gov/bitstream/handle/2014/35171/93-0738.pdf?sequence=1">Multi-interval discretization of continuous-valued attributes for classification </a><a href="https://trs.jpl.nasa.gov/bitstream/handle/2014/35171/93-0738.pdf?sequence=1">learning</a></strong>.” (1993).</p> <p style="text-align:justify;">[22] Govindarajan, M. “Hybrid <strong><a href="https://pdfs.semanticscholar.org/4ba7/465c4fab6fc008fc399337abeacaf92afc8c.pdf">Intrusion Detection Using Ensemble of Classification Methods</a></strong>.” International Journal of Computer Network & Information Security 6.2 (2014).</p> <p style="text-align:justify;"> [23] Beigh, Bilal Maqbool. “<strong><a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.843.7008&rep=rep1&type=pdf">A New Classification Scheme for Intrusion Detection Systems</a></strong>.” International Journal of Computer Network and Information Security (IJCNIS) 6.8 (2014): 56.</p> <p style="text-align:justify;">[24] Kenkre, Poonam Sinai, AnushaPai, and Louella Colaco. “Real time intrusion detection and prevention system.” Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Springer International Publishing, 2015.</p> <p style="text-align:justify;">[25] Singh, Jayveer, and Manisha J. Nene. “<a href="https://pdfs.semanticscholar.org/5856/6204c50c7b2d68c59d83fff0a0e7954d2fdc.pdf"><strong>A survey on machine learning techniques for intrusion detection systems</strong>.</a>” International Journal of Advanced Research in Computer and Communication Engineering 2.11 (2013): 4349-4355.</p> <p style="text-align:justify;">[26] Wagh, Sharmila, et al. “<strong><a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.684.1385&rep=rep1&type=pdf">Effective Framework of J48 Algorithm using Semi-Supervised Approach for Intrusion Detection</a></strong>.” International Journal of Computer Applications 94.12 (2014).</p> <h3 style="text-align:center;"><span style="color:#993300;"><strong>BENCHMARKS FOR EVALUATING ANOMALY-BASED INTRUSION DETECTION SOLUTIONS</strong></span></h3> <p style="text-align:center;"><strong>Nicholas J. Miller and Mehrdad Aliasgari</strong></p> <p style="text-align:center;"><strong>Department of Computer Engineering and Computer Science, California State University, Long Beach, Long Beach 90840, USA.</strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>ABSTRACT </strong></span></h3> <p style="text-align:justify;">Anomaly-based Intrusion Detection Systems (IDS) have gained increased popularity over time. There are many proposed anomaly-based systems using different Machine Learning (ML) algorithms and techniques, however there is no standard benchmark to compare them based on quantifiable measures. In this paper, we propose a benchmark that measures both accuracy and performance to produce objective metrics that can be used in the evaluation of each algorithm implementation. We then use this benchmark to compare accuracy as well as the performance of four different Anomaly-based IDS solutions based on various ML algorithms. The algorithms include Naive Bayes, Support Vector Machines, Neural Networks, and K-means Clustering. The benchmark evaluation is performed on the popular NSL-KDD dataset. The experimental results show the differences in accuracy and performance between these Anomaly-based IDS solutions on the dataset. The results also demonstrate how this benchmark can be used to create useful metrics for such comparisons.</p> <h3 style="text-align:justify;"> <span style="color:#333399;"><strong>KEYWORDS </strong></span></h3> <p style="text-align:justify;">Anomaly-based Detection, Intrusion Detection, Benchmarks</p> <p style="text-align:justify;"><strong>For More Details : <a href="http://aircconline.com/ijnsa/V10N5/10518ijnsa01.pdf">http://aircconline.com/ijnsa/V10N5/10518ijnsa01.pdf</a></strong></p> <p style="text-align:justify;"><strong>Volume Link : <a href="http://airccse.org/journal/jnsa18_current.html">http://airccse.org/journal/jnsa18_current.html</a></strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>REFERENCES</strong></span></h3> <p style="text-align:justify;">[1] S. Morgan, “Ransomware Damage 2015,” 2017, [Online]. Available: report-2017-5-billion/.Costs 5 Billion in 2017, Up from 350 Million in <strong><a href="https://cybersecurityventures.com/ransomware-damage-">https://cybersecurityventures.com/ransomware-damage-</a></strong></p> <p style="text-align:justify;">[2] V. Charypar, “The End of the Cloud is Coming,” 2017, [Online]. Available: <strong><a href="https://venturebeat.com/2017/11/04/the-end-of-the-cloud-is-coming/">https://venturebeat.com/2017/11/04/the-end-of-the-cloud-is-coming/</a></strong></p> <p style="text-align:justify;">[3] N. Scaife, H. Carter, P. Traynor, and K. R. Butler, “<strong><a href="https://regmedia.co.uk/2016/10/27/scaife-icdcs16.pdf">Cryptolock (and Drop it): Stopping Ran-somware Attacks on User Data</a></strong>,” in Proc. Intl. Conf. on Distributed Computing Systems, 2016, pp. 303–312.</p> <p style="text-align:justify;">[4] P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-Fernández, and E. Vázquez, “<strong><a href="http://dtstc.ugr.es/~jedv/descargas/2009_CoSe09-Anomaly-based-network-intrusion-detection-Techniques,-systems-and-challenges.pdf">Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges</a></strong>,” Computers & Security, vol. 28, no. 1-2, pp. 18–28, 2009.</p> <p style="text-align:justify;">[5] A. L. Buczak and E. Guven, “<strong><a href="https://ieeexplore.ieee.org/iel7/9739/5451756/07307098.pdf">A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection</a></strong>,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153– 1176, 2016.</p> <p style="text-align:justify;">[6] A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, “Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection,” Computers & Security, vol. 31, no. 3, pp. 357–374, 2012.</p> <p style="text-align:justify;">[7] D. H. Deshmukh, T. Ghorpade, and P. Padiya, “Intrusion Detection System by Improved Preprocessing Methods and Naïve Bayes Classifier Using NSL-KDD 99 Dataset,” in Proc. Intl. Conf. on Electronics and Communication Systems, 2014, pp. 1–7.</p> <p style="text-align:justify;">[8] M. S. Pervez and D. M. Farid, “Feature Selection and Intrusion Classification in NSL-KDD Cup 99 Dataset Employing SVMs,” in Proc. Intl. Conf. on Software, Knowledge, Information Manage-ment and Applications, 2014, pp. 1–6.</p> <p style="text-align:justify;">[9] D. Novikov, R. V. Yampolskiy, and L. Reznik, “<strong><a href="http://www.tmrfindia.org/ijcsa/v5i25.pdf">Traffic Analysis Based Identification of Attacks</a></strong>.” IJCSA, vol. 5, no. 2, pp. 69–88, 2008.</p> <p style="text-align:justify;">[10] S. Mukherjee and N. Sharma, “<a href="https://www.sciencedirect.com/science/article/pii/S2212017312002964/pdf?md5=2597d236f35ec8ddbef8ea9611b5bb67&pid=1-s2.0-S2212017312002964-main.pdf&_valck=1">I<strong>ntrusion Detection Using Naive Bayes Classifier with Feature Reduction</strong></a>,” Procedia Technology, vol. 4, pp. 119–128, 2012.</p> <p style="text-align:justify;">[11] A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, “<a href="https://pdfs.semanticscholar.org/c6f7/ef944559f7cd0cefa58328a02abe72ddacb2.pdf">A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection</a>,” in Proc. Intl. Conf. on Data Mining, 2003, pp. 25–36.</p> <p style="text-align:justify;">[12] L. Dhanabal and S. Shantharajah, “<strong><a href="https://pdfs.semanticscholar.org/1b34/80021c4ab0f632efa99e01a9b073903c5554.pdf">A Study on NSL-KDD Dataset for Intrusion Detection Sys-tem Based on Classification Algorithms</a></strong>,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 446–452, 2015.</p> <p style="text-align:justify;">[13] D. Damopoulos, S. A. Menesidou, G. Kambourakis, M. Papadaki, N. Clarke, and S. Gritzalis, “<strong><a href="https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.341">Evaluation of Anomaly-based IDS for Mobile Devices Using Machine Learning Classifiers</a></strong>,” Security and Communication Networks, vol. 5, no. 1, pp. 3–14, 2012.</p> <p style="text-align:justify;">[14] V. Kumar, H. Chauhan, and D. Panwar, “<strong><a href="https://www.cs.rit.edu/~ark/fall2015/654/team/11/presentation2.pdf">K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset</a>,</strong>” International Journal of Soft Computing and Engineering, vol. 3, no. 4, pp. 1–4, 2013.</p> <p style="text-align:justify;">[15] R. A. Calix and R. Sankaran, “<strong><a href="https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS13/paper/viewPDFInterstitial/5842/6085">Feature Ranking and Support Vector Machines Classification Analysis of the NSL-KDD Intrusion Detection Corpus</a></strong>.” in FLAIRS Conference, 2013, pp. 292–295.</p> <p style="text-align:justify;">[16] R. Jain and N. Abouzakhar, “<strong><a href="http://iranarze.ir/wp-content/uploads/2015/11/Anomaly-Intrusion-Detection-4192.pdf">A Comparative Study of Hidden Markov Model and Support Vec-tor Machine in Anomaly Intrusion Detection</a></strong>,” Journal of Internet Technology and Secured Trans-actions (JITST), vol. 2, no. 1/2, p. 3, 2013.</p> <p style="text-align:justify;">[17] A. Javaid, Q. Niyaz, W. Sun, and M. Alam, “<strong><a href="https://pdfs.semanticscholar.org/8101/1998c41e00d6b2a4dbb84dbeb2d8f51bb895.pdf">A Deep Learning Approach for Network Intrusion Detection System</a></strong>,” in Proc. 9th EAI Intl. Conf. on Bio-inspired Information and Communications Technologies, 2016, pp. 21–26.</p> <p style="text-align:justify;">[18] J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Cost-based Modeling and Evaluation for Data Mining with Application to Fraud and Intrusion Detection,” Results from the JAM Project by Salvatore, pp. 1–15, 2000.</p> <p style="text-align:justify;">[19] J. McHugh, “<a href="http://www.scs.carleton.ca/~soma/id-2006w/readings/mchugh-darpa.pdf"><strong>Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory</strong></a>,” ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 4, pp. 262–294, 2000.</p> <p style="text-align:justify;">[20] University of New Brunswick, “NSL-KDD Dataset,” [Online]. Available: <strong><a href="http://www.unb.ca/cic/research/datasets/nsl.html">http://www.unb.ca/cic/research/datasets/nsl.html</a>.</strong></p> <p style="text-align:justify;">[21] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “<strong><a href="https://www.researchgate.net/profile/Wei_Lu23/publication/48446353_A_detailed_analysis_of_the_KDD_CUP_99_data_set/links/09e4151490ae305c07000000.pdf">A Detailed Analysis of the KDD CUP 99 Data Set</a></strong>,” in IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009, pp. 1–6.</p> <p style="text-align:justify;">[22] R. A. Maxion and K. M. Tan, “<strong><a href="http://www.cs.cmu.edu/afs/cs/Web/People/maxion/pubs/maxiontan00.pdf">Benchmarking Anomaly-Based Detection Systems</a></strong>,” in Proc.Intl.Conf. on Dependable Systems and Networks, 2000, pp. 623–630.</p> <p style="text-align:justify;">[23] S. Revathi and A. Malathi, “<strong><a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.680.6760&rep=rep1&type=pdf">A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection</a></strong>,” International Journal of Engineering Research and Technology. ESRSA Publications, no. 12, pp. 1848–1853, 2013.</p> <p style="text-align:justify;">[24] N. Moustafa and J. Slay, “The UNSW-NB15 Data Set Description,” 2016, [Online]. Available: <strong><a href="https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFANB15-Datasets/">https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFANB15-Datasets/</a></strong></p> <p style="text-align:justify;">[25] C. T. Giménez, A. P. Villegas, and G. Á. Marañón, “HTTP DATASET CSIC 2010,” 2012, [On-line]. Available: <strong><a href="http://www.isi.csic.es/dataset/">http://www.isi.csic.es/dataset/</a></strong>.</p> <p style="text-align:justify;">[26] P. G. Jeya, M. Ravichandran, and C. Ravichandran, “Efficient Classifier for R2L and U2R At-tacks,” International Journal of Computer Applications, vol. 45, no. 21, p. 29, 2012.</p> <p style="text-align:justify;">[27] University of Wisconsin-Madison, “A Basic Introduction To Neural Networks,” [Online]. Avail-able: <strong><a href="http://pages.cs.wisc.edu/%20bolo/shipyard/neural/local.html">http://pages.cs.wisc.edu/ bolo/shipyard/neural/local.html</a>.</strong></p> <p style="text-align:justify;">[28] R. Xu and D. Wunsch, “Survey of Clustering Algorithms,” IEEE Transactions on Neural Networks, vol. 16, no. 3, pp. 645–678, 2005.</p> <p style="text-align:justify;">[29] ASUS, “ASUS Chromebook C300 | Laptops,” [Online]. Available: <strong><a href="https://www.asus.com/us/Laptops/ASUS_Chromebook_C300/specifications/">https://www.asus.com/us/Laptops/ASUS_Chromebook_C300/specifications/</a>.</strong></p> <p style="text-align:justify;">[30] K. Hinum, “Qualcomm Snapdragon 820 MSM8996 SoC,” 2015, [Online]. Available: <strong><a href="https://www.notebookcheck.net/Qualcomm-Snapdragon-820-MSM8996-">https://www.notebookcheck.net/Qualcomm-Snapdragon-820-MSM8996-</a></strong><strong><a href="https://www.notebookcheck.net/Qualcomm-Snapdragon-820-MSM8996-">SoC.156150.0.html</a>.</strong></p> <p style="text-align:justify;">[31] Apple, “iPhone X – Technical Specifications,” [Online]. Available: <strong><a href="https://www.apple.com/iphone-x/specs/">https://www.apple.com/iphone-x/specs/</a>.</strong></p> <p style="text-align:justify;">[32] Pandas, “Python Data Analysis Library,” [Online]. Available: <strong><a href="https://pandas.pydata.org/">https://pandas.pydata.org/</a>.</strong></p> <p style="text-align:justify;">[33] Scikit-learn, “Machine Learning in Python,” [Online]. Available: <strong><a href="http://scikit-learn.org/stable/">http://scikit-learn.org/stable/</a>.</strong></p> <p style="text-align:justify;">[34] Canonical, “Ubuntu,” 2018, [Online]. Available: <strong><a href="https://www.ubuntu.com/">https://www.ubuntu.com/</a></strong>.</p> <p style="text-align:justify;">[35] N. Miller, “Anomaly IDS Benchmark,” 2018, [Online]. Available: <strong><a href="https://github.com/AnomalyIDSBench%20mark/">https://github.com/AnomalyIDSBench mark/</a></strong>.</p> <p style="text-align:justify;">[36] D. Goldberg, “<a href="http://www.akira.ruc.dk/~keld/teaching/CAN_e14/Readings/Goldberg91.pdf">What Every Computer Scientist Should Know About Floating-point Arithmetic,</a>”ACM Computing Surveys (CSUR), vol. 23, no. 1, pp. 5–48, 1991.</p> <p style="text-align:justify;">[37] N. J. Miller, “Benchmarks for evaluating anomaly-based intrusion detection solutions,” Master Thesis, California State University, Long Beach, 2018. [Online]. Available: <strong><a href="https://www.notebookcheck.net/Qualcomm-Snapdragon-820-MSM8996-">https:</a><a href="https://www.notebookcheck.net/Qualcomm-Snapdragon-820-MSM8996-">//search.proquest.com/docview/2040857774</a></strong></p> <h3 style="text-align:center;"><span style="color:#993300;"><strong>CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET</strong></span></h3> <p style="text-align:center;"><strong>Shaker El-Sappagh, Ahmed Saad Mohammed, Tarek Ahmed AlSheshtawy</strong></p> <p style="text-align:center;"><strong>Faculty of Computers & Informatics, Benha University, Egypt.</strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>ABSTRACT</strong></span></h3> <p style="text-align:justify;"> In network security framework, intrusion detection is one of a benchmark part and is a fundamental way to protect PC from many threads. The huge issue in intrusion detection is presented as a huge number of false alerts; this issue motivates several experts to discover the solution for minifying false alerts according to data mining that is a consideration as analysis procedure utilized in a large data e.g. KDD CUP 99. This paper presented various data mining classification for handling false alerts in intrusion detection as reviewed. According to the result of testing many procedure of data mining on KDD CUP 99 that is no individual procedure can reveal all attack class, with high accuracy and without false alerts. The best accuracy in Multilayer Perceptron is 92%; however, the best Training Time in Rule based model is 4 seconds . It is concluded that various procedures should be utilized to handle several of network attacks.</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>KEYWORDS </strong></span></h3> <p style="text-align:justify;">Intrusion Detection, Data Mining, KDD CUP 99, False Alarms</p> <p style="text-align:justify;"><strong>For More Details : <a href="http://aircconline.com/ijnsa/V11N3/11319ijnsa02.pdf">http://aircconline.com/ijnsa/V11N3/11319ijnsa02.pdf</a></strong></p> <p style="text-align:justify;"><strong>Volume Link : <a href="http://airccse.org/journal/jnsa19_current.html">http://airccse.org/journal/jnsa19_current.html</a></strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>REFERENCES</strong></span></h3> <p style="text-align:justify;">[1] Aleksandar Lazarevic, Levent Ertoz, Vipin Kumar, Aysel Ozgur, Jaideep Srivastava, “<strong><a href="https://pdfs.semanticscholar.org/c6f7/ef944559f7cd0cefa58328a02abe72ddacb2.pdf">A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection</a></strong>”</p> <p style="text-align:justify;">[2] Denning D. E, An intrusion-detection model, IEEE Transactions on Software Engineering, vol. SE13, no. 2, pp.222-232.</p> <p style="text-align:justify;">[3] Zesheng C., L. Gao and K. Kwiat, “<strong><a href="http://nnt.es/Modeling%20the%20Spread%20of%20Active%20Worms.pdf">Modeling the Spread of Active Worms</a>”</strong>, Twenty Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 3,pp:1890-1900, 2003.</p> <p style="text-align:justify;">[4] W. Lee and S. J. Stolfo, “<strong><a href="https://www.usenix.org/legacy/publications/library/proceedings/sec98/full_papers/lee/lee.pdf">Data Mining Approaches for Intrusion Detection</a></strong>”, the 7th USENIX Security Symposium, San Antonio, TX, January 1998.</p> <p style="text-align:justify;">[5] Moradi M., Zulkernine M., 2003, “<strong><a href="http://www.cs.queensu.ca/~moradi/148-04-MM-MZ.pdf">A Neural Network Based System for Intrusion Detection and Classification of Attack</a></strong>”, Natural Science and Engineering Research Council Canada (NSERC).</p> <p style="text-align:justify;">[6] Symantec Enterprise.: Internet Security Threat Report 2016. <strong><a href="https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf">https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf</a></strong>. [accessed 18.03.17].</p> <p style="text-align:justify;">[7] Arman Tajbakhsh, Mohammad Rahmati, and Abdolreza Mirzaei, “<strong><a href="http://www.academia.edu/download/39938400/Intrusion_detection_using_fuzzy_associat20151112-5796-vw66lg.pdf">Intrusion detection using fuzzy association rules</a></strong>“, Applied Soft Computing ASOC509, Elsevier B.V, 2008.</p> <p style="text-align:justify;">[8] J.Hu, Host-Based Anomaly IDS. Springer Handbook of Information and Communication Security, Springer Verlag, 2010, ISBN978-3-642-04116-7 (Print), 978-3-642-04117-4 (Online)</p> <p style="text-align:justify;">[9] H Wang, J Cao, and Y Zhang, ”<strong><a href="https://eprints.usq.edu.au/archive/00003161/01/Wang_Cao_Zhang.pdf">A flexible payment scheme and its role-based access control</a></strong>”, IEEE Transactions on knowledge and Data Engineering, vo. 17, no. 3, 425–436, 2005.</p> <p style="text-align:justify;">[10] Y. Zhang, Y. Shen, H. Wang, Y. Zhang, X. Jiang, “<strong><a href="https://www.researchgate.net/profile/Hua_Wang11/publication/282523992_On_Secure_Wireless_Communications_for_Service_Oriented_Computing/links/59d994c4aca272e60966d80e/On-Secure-Wireless-Communications-for-Service-Oriented-Computing.pdf">On Secure Wireless Communications for Service Oriented Computing</a></strong>,” IEEE Transactions on Services Computing, no.1, pp. 1.</p> <p style="text-align:justify;">[11] D. Wang, Z. Zhang, P. Wang, J. Yan, and X. Huang, ”<strong><a href="http://eprints.lancs.ac.uk/85017/1/ccs16.pdf">Targeted Online Password Guessing: An Underestimated Threat</a></strong>,” ACM Conference on Computer and Communications Security, pp. 1242-1254, 2016</p> <p style="text-align:justify;">[12] K.K. Gupta, B. Nath and R. Kotagiri, “Layered Approach Using Conditional Random Fields for Intrusion Detection,” IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 1, pp. 35–49, 2010.</p> <p style="text-align:justify;">[13] Warrender C., Forrest S. and Pearl M.,“<strong><a href="http://eprints.maynoothuniversity.ie/1418/1/DetectingIntrusions.pdf">Detecting Intrusions Using System Calls: Alternative Data Models</a></strong>”, in IEEE symposium on security and privacy, pp:133-145, 1999.</p> <p style="text-align:justify;">[14] Wenke L. and S. J.Stolfo, “<strong><a href="http://www-static.cc.gatech.edu/~wenke/ids-readings/lee_dmids_frmwk.pdf">A Framework for Constructing Features and Models for Intrusion Detection Systems</a></strong>”, ACM transactions on Information and system security (TISSEC), vol.3, Issue 4, Nov 2000.</p> <p style="text-align:justify;">[15] Agarwal R., Joshi M.V., “PNrule: A New Framework for Learning Classifier Models in Data Mining”, Tech. Report, Dept. of Computer Science, University of Minnesota, 2000.</p> <p style="text-align:justify;">[16] Daniel B., J.Couto, S.Jajodia, and N.Wu, “ADAM: A Test Bed for Exploring the Use of Data Mining in Intrusion Detection”, SIGMOD, vol30, no.4, pp: 15-24, 2001.</p> <p style="text-align:justify;">[17] Abraham T. , “<strong><a href="https://apps.dtic.mil/dtic/tr/fulltext/u2/a392237.pdf">IDDM: Intrusion Detection Using Data Mining Techniques</a></strong>”, Technical report DSTO electronics and surveillance research laboratory, Salisbury, Australia, May 2001.</p> <p style="text-align:justify;">[18] Zheng Z., J. Li, C.N. Manikapoulos, J.Jorgenson, J.ucles, “<strong><a href="http://www.cs.rhodes.edu/~welshc/COMP465_S15/Papers/t2a2.pdf">HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Pre-Processing and Neural Network Classification</a></strong>”, IEEE workshop proceedings on Information assurance and security, pp:85-90, 2001.</p> <p style="text-align:justify;">[19] Xu X., “<strong><a href="http://www.jilsa.net/xu-ijwsp2006-vol2-07.pdf">Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and equential Pattern Prediction</a></strong>”, International Journal of Web Services Practices 2(1-2), pp:49–58, 2006.</p> <p style="text-align:justify;">[20] Li Y., Guo L., “<strong><a href="https://pdfs.semanticscholar.org/b19b/37a291bffdb9038f06e2bfadf26209c53280.pdf">An Active Learning Based TCM-KNN Algorithm for Supervised Network Intrusion Detection</a></strong>”, In: 26 th Computers and Security, pp: 459–467, October 2007.</p> <p style="text-align:justify;">[21] Mrutyunjaya P. and M. Ranjan Patra, ” Evaluating Machine Learning Algorithms for Detecting Network Intrusions”, International Journal of Recent Trends in Engineering, vol. 1, no.1, May 2009.</p> <p style="text-align:justify;">[22] Mohammed M Mazid, M. Shawkat Ali, Kevin S. Tickle,“A Comparison Between Rule Based and Association Rule Mining Algorithms “, Third International Conference on Network and System Security, 2009.</p> <p style="text-align:justify;">[23] Sathyabama S., Irfan Ahmed M., Saravanan A,”<strong><a href="https://pdfs.semanticscholar.org/946b/6d94d932d0f5899cf6705249cafcc86ffed9.pdf">Network Intrusion Detection Using Clustering: A Data Mining Approach</a></strong>”, International Journal of Computer Application (0975-8887), vol. 30, no. 4, Sep. 2011.</p> <p style="text-align:justify;">[24] Chihab Y. , Ouhman A., Erritali m. and Ouahidi B.,2013,”<strong><a href="https://pdfs.semanticscholar.org/3482/80fcb1d2b93d1b97f8322488aa42083701cf.pdf">Detection & Classification of Internet Intrusion Based on the Combination of Random Forest and Naïve Bayes</a></strong> “, International Journal of Engineering and Technology (IJET), 2013</p> <p style="text-align:justify;">[25] Keerthika G. and Priya D. S.,”<strong><a href="https://pdfs.semanticscholar.org/51cc/26f75c767b0fdbf41e284b9e4e6bb208955d.pdf">Feature Subset Evaluation and Classification using Naive Bayes Classifier</a></strong>“, Journal of Network Communications and Emerging Technologies (JNCET) Volume 1, Issue 1, March (2015) 2015</p> <p style="text-align:justify;">[26] Tesfahun A. and D.Bhaskari L., ,”Effective Hybrid Intrusion Detection System: A Layered Approach”, IJCNIS, vol.7, no.3, pp.35-41, 2015</p> <p style="text-align:justify;">[27] Aggarwal P. and Sharma S.K.,” An Empirical Comparison of Classifiers to Analyze Intrusion Detection”, Proc. of Fifth International Conference an Advanced Computing and Communication Technologies, 2015.</p> <p style="text-align:justify;">[28] Mukund Y. and Nayak S., ‘Improving false alarm rate in intrusion detection systems using Hadoop’, 21-24 Sept, International Conference. Vol.3 , 2016</p> <p style="text-align:justify;">[29] Gupta D., Singhal S, Malik S. and Singha., Network intrusion detection system using various data mining techniques, IEEE publication, 2016.</p> <p style="text-align:justify;">[30] Akashdeep Sharma ,Ishfaq Manzoor, Neeraj Kumar, A Feature Reduced Intrusion Detection System Using ANN Classifier, Expert Systems With Applications (2017)</p> <p style="text-align:justify;">[31] E. Kabir, J. Hu, H. Wang, G. Zhuo, <strong><a href="https://eprints.usq.edu.au/30388/1/paper.pdf">A novel statistical technique forintrusion detection systems</a></strong>, Future Generation Computer Systems (2017)</p> <p style="text-align:justify;">[32] L. Duan and Y. Xiao, “An Intrusion Detection Model Based on Fuzzy C-means Algorithm,”, 8<sup>th</sup> International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, pp. 120-123. (2018)</p> <p style="text-align:justify;">[33] Wang, Zheng. “<strong><a href="https://ieeexplore.ieee.org/iel7/6287639/6514899/08408779.pdf">Deep learning-based intrusion detection with adversaries</a></strong>.” IEEE Access 6 , 38367- 38384.(2018):</p> <p style="text-align:justify;">[34] Raheem Esraa and Saleh Alomari ,”<strong><a href="https://www.iasj.net/iasj?func=fulltext&aId=144420">An Adaptive Intrusion Detection System by using Decision Tree Osamah Adil</a></strong>“, Journal of AL-Qadisiyah for computer science and mathematics Vol.10 No.2,(2018).</p> <p style="text-align:justify;">[35] Chen M.S., Han J and Yu Philip S., Data Mining: An Overview from a Database Perspective, IEEE Transactions on Knowledge and Data Engineering, vol.8,No.6,1996,pp.866-883.</p> <p style="text-align:justify;">[36] Christine Dartigue, Hyun IK Jang, Wenjun Zeng, A New data-mining based approach for network Intrusion detection, Proc. of Seventh Annual Communication Networks and Services Research Conference, 2009, pp.372-377.</p> <p style="text-align:justify;">[37] Foster Provost, Tom Fawcett, Robust Classification for Imprecise Environment, 2000, pp.1-38, Kluwer Academic Publishers.</p> <p style="text-align:justify;">[38] Chawla N.V, Bowyer K.W, Hall L.O, Kegelmeyer W.P, Smote: Synthetic minority oversampling technique, Journal of Artificial Intelligence Research, vol.16, 2002, pp.321–357.</p> <p style="text-align:justify;">[39] Dewan Md. Farid, Nouria Harbi, Mohammad Zahidur Rahman , <strong><a href="https://arxiv.org/pdf/1005.4496">Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection</a></strong>, Proc. of Intl. Journal of Network Security & Its Applications (IJNSA), Volume 2, Number 2, 2010, pp.12-25.</p> <p style="text-align:justify;">[40] Domingos P. and Pazzani M., Beyond Independence: Conditions for the optimality of the simple Bayesian Classifier, In proceedings of the 13 th. Conference on Machine Learning, 1996, pp.105-110.</p> <p style="text-align:justify;">[41] Yeung D. Y. and Chow C., “Prazen-window Network Intrusion Detectors”, In: 16th International Conference on Pattern Recognition, Quebec, Canada, pp:11–15, August 2002.</p> <p style="text-align:justify;">[42] Yeung D. Y. and Chow C., “Prazen-window Network Intrusion Detectors”, In: 16 th International Conference on Pattern Recognition, Quebec, Canada, pp:11–15, August 2002</p> <p style="text-align:justify;">[43] Witten I. H. and Frank E., “ <strong><a href="http://thuvien.thanglong.edu.vn:8081/dspace/bitstream/DHTL_123456789/4050/1/Data%20mining-1.pdf">Data Mining: Practical Machine Learning Tools and Techniques</a></strong>”, 2<sup>nd</sup> edn. Morgan Kaufmann, San Francisco, 2005.</p> <p style="text-align:justify;">[44] Huy A. N., D. Choi ,”<strong><a href="https://arxiv.org/pdf/1007.1268">Application of Data Mining to Network Intrusion Detection: Classifier Selection Model</a></strong>”, pp:1, 2008.</p> <p style="text-align:justify;">[45] Mohammed M Mazid, M. Shawkat Ali, Kevin S. Tickle,“A Comparison Between Rule Based and Association Rule Mining Algorithms “, Third International Conference on Network and System Security, 2009.</p> <p style="text-align:justify;">[46] Kusum K. Bharti, S. Shukla and S. Jain , “Intrusion detection using clustering”, vol.1, issue 2, 3, 4, pp.6, 2010.</p> <p style="text-align:justify;">[47] Amanpreet C., G. Mishra, G. Kumar, “Survey on Data Mining Techniques in Intrusion Detection” , vol: 2, issue.7, pp:2, 2011.</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>AUTHORS</strong></span></h3> <p style="text-align:justify;">Shaker El-Sappagh received the bachelor’s degree in computer scienc<span style="color:var(--color-text);">e </span><span style="color:var(--color-text);">fromthe Information Systems Department, Faculty of Computers and Inform</span><span style="color:var(--color-text);">ation, Cairo University, Egypt, in 1997,the master’s degree from Cairo University, in 2007,and the Ph.D. degree in computer science from the Information Systems Department, Faculty of Computers and Information, Mansura University,Mansura, Egypt, in 2015. In 2003, he joined the Department of Information Systems, Faculty of Computers and Information, Minia University, Egypt, as a Teaching Assistant. Since 2016, he has been an Assistant Professor with the Department of Information Systems, Faculty of Computers and Information, Benha University. He is currently a Postdoctoral Fellow with the UWB Wire-less Communications Research Center, Department of Information and Communication Engineering, Inha University, South Korea. He has publications in clinical decision support systems and semantic intelligence. His current research interests include machine learning, medical informatics, (fuzzy) ontology engineering, distributed and hybrid clinical decision support systems, semantic data modeling, fuzzy expert systems, and cloud computing. He is very interested in the diseases diagnosis and treatment researches. He is a Reviewer for many journals.</span></p> <p style="text-align:justify;">Ahmed saad Mohammed received the bachelor’s degree from the Software engineering Department, Baghdad College of Economic Sciences University, Iraq, Baghdad in 200 5. His current research interests include machine learning, data mining and artificial intelligence</p> <p style="text-align:justify;">Dr. Tarek El-Shishtawy is a professor of Information System. His current work is vice Dean of postgraduates and researches at faculty of computers and informatics. The s cientific interests in clude Information Retrieval, Data Mining, and researches related to information systems in developing countries. Dr. Tarek published and refereed many articles in NLP.<strong> </strong></p> <h3 style="text-align:center;"><span style="color:#993300;"><strong>MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION</strong></span></h3> <p style="text-align:center;"><strong>Shaker El-Sappagh, Ahmed saad Mohammed, Tarek Ahmed AlSheshtawy</strong></p> <p style="text-align:center;"><strong>Faculty of Computers & Informatics, Benha University, Egypt.</strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>ABSTRACT </strong></span></h3> <p style="text-align:justify;">Intrusion detection is one of the standard stages to protect computers in network security framework from several attacks. False alarms problem is critical in intrusion detection, which motivates many researchers to discover methods to minify false alarms. This paper proposes a procedure for classifying the type of intrusion according to multi-operations and multi-layer classifier for handling false alarms in intrusion detection. The proposed system is tested using on KDDcup99 benchmark. The performance showed that results obtained from three consequent classifiers are better than a single classifier. The accuracy reached 98% based on 25 features instead of using all features of KDDCup99 dataset.</p> <h3 style="text-align:justify;"> <span style="color:#333399;"><strong>KEYWORDS </strong></span></h3> <p style="text-align:justify;">Intrusion detection, multi-layer classifier, KDD CUP 99, False Alarms</p> <p style="text-align:justify;"><strong>For More Details : <a href="http://aircconline.com/ijnsa/V11N3/11319ijnsa04.pdf">http://aircconline.com/ijnsa/V11N3/11319ijnsa04.pdf</a></strong></p> <p style="text-align:justify;"><strong>Volume Link : <a href="http://airccse.org/journal/jnsa19_current.html">http://airccse.org/journal/jnsa19_current.html</a></strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>REFERENCES</strong></span></h3> <p style="text-align:justify;">[1] Vaidya h., Mirza SH., and Mail N.,”Intrusion System”, International Journal of advance research in engineering, science and technology, e-ISSN:2393-9877, p-ISSN:2394-2444,vol 3, Issue 3, Mar 2016.</p> <p style="text-align:justify;">[2] Nadiammai G.V and Hemalatha M.,”Effective Approach Toward Intrusion Detection System Using Data Mining Techniques”, Elsevier B.V. Egyption Informatics Journal, 2014.</p> <p style="text-align:justify;">[3] Islam A. and Islam M., “A Novel Signature_Based Traffic Classification Engine Reduce False Alarms in Intrusion Detection systems”, International Journal of Computer Networks and Communications (IJCNC) vol 7, No.1, Jan 2015.</p> <p style="text-align:justify;">[4] Al-Saedi K. and Manickam S., “<strong><a href="https://core.ac.uk/download/pdf/25795520.pdf">research proposal: An Intrusion Detection System Alert Reduction and Assessment Framework Based on Data Mining</a></strong>“, Journal of Computer Science, 9(4):421-426,2013.</p> <p style="text-align:justify;">[5] Dult, I. and Dr.Borah S. “Some Studies in The Intrusion Detection Using Data Mining Techniques”. International Journal of Innovative Research in Science, Engineering and Technology, 4(7), 2015. .</p> <p style="text-align:justify;">[6] Novakovic, J., Strbac P. and Bulatovic, “<strong><a href="http://www.yujor.fon.bg.ac.rs/index.php/yujor/article/download/364/255">Toward Optimal Feature Selection Using Ranking Methods and Classifications Algorithms</a></strong>“. Yugoslav Journal of operations research, 2011.</p> <p style="text-align:justify;">[7] Goeschel K., “Reducing False positives in Intrusion Detection systems using Data-Mining Techniques utilizing Support Vector Machines, Decision Trees and Naïve Bayes for off-line analysis”, IEEE, International Conference on 30 March-3 April 2016, USA, 7506774, July 2016.</p> <p style="text-align:justify;">[8] Mahmood D.Y., “<strong><a href="https://www.researchgate.net/profile/Deeman_Mahmood/publication/317644832_Classification_Trees_with_Logistic_Regression_Functions_for_Network_Based_Intrusion_Detection_System/links/599d540145851574f4b2957e/Classification-Trees-with-Logistic-Regression-Func">Classification Trees with Logistic Regression Functions for Network Based</a> <a href="https://www.researchgate.net/profile/Deeman_Mahmood/publication/317644832_Classification_Trees_with_Logistic_Regression_Functions_for_Network_Based_Intrusion_Detection_System/links/599d540145851574f4b2957e/Classification-Trees-with-Logistic-Regression-Func">Intrusion Detection System</a></strong>“, (IOSR-JCE) Journal of computer Engineering, e-ISSN: 2278-0661, p-ISSN: 2278-8727, vol 19, Issue 3, pp 48-52, June 2017.</p> <p style="text-align:justify;">[9] Belavagi M.C. and Muniyal B., “<strong><a href="https://www.sciencedirect.com/science/article/pii/S187705091631081X/pdf?md5=869a59c0e4be7ec617916ab925b8604b&isDTMRedir=Y&pid=1-s2.0-S187705091631081X-main.pdf">Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection</a></strong>“, (IMCIP) International Multi-conference on Information Processing-2016, Elsevier, vol 89, pages 117-123, 2016.</p> <p style="text-align:justify;">[10] L. Duan and Y. Xiao, “An Intrusion Detection Model Based on Fuzzy C-means Algorithm,”, 8<sup>th</sup> International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, pp. 120-123. (2018)</p> <p style="text-align:justify;">[11] Wang, Zheng. “<strong><a href="https://ieeexplore.ieee.org/iel7/6287639/6514899/08408779.pdf">Deep learning-based intrusion detection with adversaries</a></strong>.” IEEE Access 6 , 38367-38384.(2018):</p> <p style="text-align:justify;">[12] Raheem Esraa and Saleh Alomari ,”An Adaptive Intrusion Detection System by using Decision Tree Osamah Adil”, Journal of AL-Qadisiyah for computer science and mathematics Vol.10 No.2,(2018).</p> <p style="text-align:justify;">[13] Siddiqui M.K. and Naahid Sh., “<strong><a href="https://pdfs.semanticscholar.org/97f2/79238718c32fa4c04ba888cd440b36c2ca8c.pdf">Analysis of Kdd cup 99 Dataset Using Clustering Based Data Mining</a></strong>“, International Journal of database theory and application, pp.23-34, vol.6, No.5(2013).</p> <p style="text-align:justify;">[14] Tavallaee M., Bagheri E., Lu W. and Ghorbani A.A, “<strong><a href="https://www.researchgate.net/profile/Wei_Lu23/publication/48446353_A_detailed_analysis_of_the_KDD_CUP_99_data_set/links/09e4151490ae305c07000000.pdf">A Detailed Analysis of the Kdd Cup 99 Data set</a></strong>“, proceedings of the IEE symposium on computational intelligence in security and defense applications ,2009.</p> <p style="text-align:justify;">[15] Nelcileno A., R. Oliveira, A. Akira Shinoda, B. Bhargava, “<strong><a href="https://www.researchgate.net/profile/Nelcileno_Araujo/publication/224143521_Identifying_important_characteristics_in_the_KDD99_intrusion_detection_dataset_by_feature_selection_using_a_hybrid_approach/links/5a09a09ca6fdcc8b54775894/Identifying-important-cha">Identifying Important Characteristics in the KDD99 Intrusion Detection Dataset by Feature Selection using a Hybrid Approach</a></strong>”, pp:2, 2010.</p> <p style="text-align:justify;">[16] Mahbod T., E. Bagheri, Wei Lu, and A. A. Ghorbani ,” A Detailed Analysis of the KDD CUP 99 Data Set”, p.2, 2009.</p> <p style="text-align:justify;">[17] Brifcani A.M.A. and Issa A.S., “<strong><a href="https://www.iasj.net/iasj?func=fulltext&aId=26174">Intrusion Detection and Attack Classifier based on Three Techniques: A Comparative Study</a></strong>“, Journal of engineering and Technology, Vol.29, No.2, 2011.</p> <p style="text-align:justify;">[18] Wahba Y., Elsalamouny E. and El Taweel G., “<strong><a href="https://arxiv.org/pdf/1507.06692">Improving the performance of Multi-class Intrusion Detection Systems using features reduction</a></strong>“, (IJCSI) International Journal of computer science Issues, Vol 12, Issue 3,2015</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>AUTHORS</strong></span></h3> <p style="text-align:justify;">Shaker El-Sappagh received the bachelor’s degree in computer science from the Information Systems Department, Faculty of Computers and Information, Cairo University, Egypt, in 1997,the master’s degree from Cairo University, in 2007,and the Ph.D. degree in computer science from the Information Systems Department, Faculty of Computers and Information, Mansura University,Mansura, Egypt, in 2015. In 2003, he joined the Department of Information Systems, Faculty of Computers and Information, Minia University, Egypt, as a Teaching Assistant. Since 2016, he has been an Assistant Professor with the Department of Information Systems, Faculty of Computers and Information, Benha University. He is currently a Postdoctoral Fellow with the UWB Wire-less Communications Research Center, Department of Information and Communication Engineering, Inha University, South Korea. He has publications in clinical decision support systems and semantic intelligence. His current research interests include machine learning, medical informatics, (fuzzy) ontology engineering, distributed and hybrid clinical decision support systems, semantic data modeling, fuzzy expert systems, and cloud computing. He is very interested in the diseases diagnosis and treatment researches. He is a Reviewer for many journals</p> <p style="text-align:justify;">Ahmed saad Mohammed received the bachelor’s degree from the Software engineering Department, Baghdad College of Economic Sciences University, Iraq, Baghdad in 2005. His current research interests include machine learning, data mining and artificial intelligence</p> <p style="text-align:justify;">Dr. Tarek El-Shishtawy is a professor of Information System. His current work is vice Dean of postgraduates and researches at faculty of computers and informatics. The scientific interests in clude Information Retrieval, Data Mining, and researches related to information systems in developing countries. Dr. Tarek published and refereed many articles in NLP.</p> <h3 style="text-align:center;"><span style="color:#993300;"><strong>A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYBASED NIDS</strong></span></h3> <p style="text-align:center;"><strong>Nguyen Thanh Van<sup>1,2</sup>, Tran Ngoc Thinh<sup>1</sup>, Le Thanh Sach<sup>1</sup></strong></p> <p style="text-align:center;"><strong><sup>1</sup>Faculty of Computer Science and Engineering. Ho Chi Minh City University of Technology, VNUHCM, VietNam.</strong></p> <p style="text-align:center;"><strong><sup>2</sup>Ho Chi Minh City University of Technology and Education, VietNam.</strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>ABSTRACT</strong></span></h3> <p style="text-align:justify;">Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.</p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>KEYWORDS</strong></span></h3> <p style="text-align:justify;">Anomaly-based network intrusion detection system, temporal sequence, data description</p> <p style="text-align:justify;"><strong>For More Details : <a href="http://aircconline.com/ijnsa/V11N3/11319ijnsa07.pdf">http://aircconline.com/ijnsa/V11N3/11319ijnsa07.pdf</a></strong></p> <p style="text-align:justify;"><strong>Volume Link : <a href="http://airccse.org/journal/jnsa19_current.html">http://airccse.org/journal/jnsa19_current.html</a> </strong></p> <h3 style="text-align:justify;"><span style="color:#333399;"><strong>REFERENCES</strong><strong> </strong></span></h3> <p style="text-align:justify;">[1] Klaus G, Rupesh K. S., Jan K. et al., “LSTM – A Search Space Odyssey”, Transactions on neural networks and learning systems, 2017.</p> <p style="text-align:justify;">[2] Krawczyk and Bartosz, “Learning from imbalanced data: open challenges and future directions,” Prog Artif Intell5:221–232, Springerlink.com, 2016.</p> <p style="text-align:justify;">[3] B. Scholkopf, J. C. Platt, J. Shawe-Taylor et al., “<strong><a href="http://www.recognition.mccme.ru/pub/papers/SVM/sch99estimating.pdf">Estimating the support of a high-dimensional distribution</a></strong>,” 2001.</p> <p style="text-align:justify;">[4] D. M. Tax and R. P. Duin, “<strong><a href="https://link.springer.com/content/pdf/10.1023/B:MACH.0000008084.60811.49.pdf">Support vector data description</a>,</strong>” in Machine Learning, 2004.</p> <p style="text-align:justify;">[5] Tolga Ergen, et al.”<strong><a href="https://arxiv.org/pdf/1710.09207">Unsupervised and Semi-supervised Anomaly Detection with LSTM Neural Networks</a></strong>“, arXiv:1710.09207 [eess.SP], 2017.</p> <p style="text-align:justify;">[6] Chandola V., Banerjee A. and Kumar V., “Anomaly detection: A survey,” Technical report, USA, 2009.</p> <p style="text-align:justify;">[7] M. Ahmed, A. Naser Mahmood and J. Hu, “<strong><a href="https://www.gta.ufrj.br/~alvarenga/files/CPE826/Ahmed2016-Survey.pdf">A survey of network anomaly detection techniques</a></strong>,” Journal of Network and Computer Applications, p. 13, 2015.</p> <p style="text-align:justify;">[8] Nguyen Thanh Van and Tran Ngoc Thinh, “Accelerating anomaly-based IDS using neural network on GPU,” in IEEE International Conference on Advanced Computing and Applications, 2015.</p> <p style="text-align:justify;">[9] L. Arnold, S. Rebecchi, S. Chevallier et al., “An Introduction to Deep Learning,” in European Symposium on Artificial Neural Networks, Bruges (Belgium), 2011.</p> <p style="text-align:justify;">[10] Nguyen Thanh Van, Le Thanh Sach and Tran Ngoc Thinh, “An anomaly-based Network Intrusion Detection System using Deep learning,” in IEEE International Conference on System Science and Engineering, 2017.</p> <p style="text-align:justify;">[11] Y. Feng, Y. Li and J. Luo, “<strong><a href="http://vision.unipv.it/CV/materiale2016-17/3rd%20Choice/0213.pdf">Learning Effective Gait Features Using LSTM</a></strong>,” in 23rd International Conference on Pattern Recognition (ICPR), México, 2016.</p> <p style="text-align:justify;">[12] Z. Xu, S. Li and W. Deng, “Learning Temporal Features Using LSTM-CNN Architecture for Face Anti-spoofing,” in 3rd IAPR Asian Conference on Pattern Recognition, 2015</p> <p style="text-align:justify;">[13] Ji K., Jae K., Huong LTT et al., “LSTM – RNN Classifier for Intrusion Detection,” in International Conference Platform Technology and Service (PlatCon), South Korea, 2016.</p> <p style="text-align:justify;">[14] Ralf C. Staudemeyer, “Applying LSTM RNN to intrusion detection,” South African Computer Journal, p. 6, 2015.</p> <p style="text-align:justify;">[15] Lo¨ıc B., Van Cao, James M. et al., “Collective Anomaly Detection based on LSTM RNN,” in International Conference on Future Data and Security Engineering, 2016.</p> <p style="text-align:justify;">[16] Min Ch., Qi.X., J.L. et al., “<strong><a href="http://www.covert.io/research-papers/deep-learning-security/MS-LSTM%20-%20a%20Multi-Scale%20LSTM%20Model%20for%20BGP%20Anomaly%20Detection.pdf">MS-LSTM: a Multi-Scale LSTM Model for BGP anomaly detection</a></strong>,” in 24th International Conference on Network Protocols (ICNP), 2016.</p> <p style="text-align:justify;">[17] P. Malhotra, L. Vig, G. Shroff et al., “<strong><a href="https://www.elen.ucl.ac.be/Proceedings/esann/esannpdf/es2015-56.pdf">Long Short Term Memory Networks for Anomaly Detection in Time Series</a></strong>,” in Presses universitaires de Louvain, 2015.</p> <p style="text-align:justify;">[18] Agarap and A Fred, “A NN Architecture Combining GRU and SVM for Intrusion Detection in network traffic data,” in Machine Learning and Computing (ICMLC), 2018.</p> <p style="text-align:justify;">[19] Mary H. and Yashwant P. S., “One-class SVM approach to anomaly detection,” Taylor & Francis Group, LLC, 2013.</p> <p style="text-align:justify;">[20] QA Tran, H. Duan and X. Li, “One-class SVM for Anomaly Network Traffic Detection,”Researchgate, 2004.</p> <p style="text-align:justify;">[21] Yang Z., Nirvana M. and Paul H., “<strong><a href="https://www.researchgate.net/profile/Paul_Havinga/publication/221192293_Adaptive_and_Online_One-Class_Support_Vector_Machine-Based_Outlier_Detection_Techniques_for_Wireless_Sensor_Networks/links/5948d6100f7e9b1d9b238105/Adaptive-and-Online-One-Class-Suppor">Adaptive and Online One-Class SVM-based Outlier Detection Techniques for Wireless Sensor Networks</a>,</strong>” in Advanced Information Networking and Applications Workshops., 2009.</p> <p style="text-align:justify;">[22] Abdulrahman A. and Leslie S. S., “<strong><a href="https://www.researchgate.net/profile/Leslie_Smith7/publication/261094071_A_novel_approach_combining_recurrent_neural_network_and_support_vector_machines_for_time_series_classification/links/56aa3e1708ae7f592f0f2c1b.pdf">A Novel Approach Combining RNN and SVM for time series</a></strong>,” in 9th Innovations in Information Technology (IIT), UK, 2013.</p> <p style="text-align:justify;">[23] Vapnik, “Statistical Learning Theory.,” Wiley, 1995.</p> <p style="text-align:justify;">[24] M. Lincoln, <strong><a href="http://kdd.ics.uci.edu/databases/kddcup99">http://kdd.ics.uci.edu/databases/kddcup99</a></strong>.</p> <p style="text-align:justify;">[25] N. Moustafa and J. Slay, “<a href="https://www.researchgate.net/profile/Jill_Slay/publication/290061926_The_evaluation_of_Network_Anomaly_Detection_Systems_Statistical_analysis_of_the_UNSW-NB15_data_set_and_the_comparison_with_the_KDD99_data_set/links/59d9cf58aca272e6096bbfcb/The-evaluation"><strong>The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 dataset</strong></a>,” Information Security: A Global Perspective, pp. 1-14, 2016.</p> <p style="text-align:justify;">[26] I. Sharafaldin, A. Habibi Lashkari, and Ali A. Ghorbani, “<strong><a href="http://www.scitepress.org/Papers/2018/66398/66398.pdf">Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization</a></strong>,” in 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, Jan, 2018.</p> <p style="text-align:justify;">[27] M. Turcotte, A. Kent and C. Hash, “Unified Host and Network Data Set,” Data Science for CyberSecurity, pp. 1-22, Nov, 2018.</p> <p style="text-align:justify;">[28] Badran, Khaled, Rockett et al., “Multi-class pattern classification using single, multi-dimensional feature-space feature extraction evolved by multi-objective genetic programming and its application to NID,” Genet Program Evolvable, p. 31, 2012.</p> <p style="text-align:justify;">[29] Abdulla Amin A. and Mamun Bin I. R., “A novel SVM-kNN-PSO ensemble method for intrusion detection system,” Applied Soft Computing. © 2015 Published by Elsevier B.V, p. 13, 2015.</p> <p style="text-align:justify;">[30] Li Y., Xia J., Zhang S. et al., “An efficient intrusion detection system based on support vector machine and gradually features removal method,” Expert System with Applications, vol. 39, no. 424–430, p. 7, 2012.</p> <p style="text-align:justify;">[31] Amiri F., Yousefi M. M. R., Lucas C. et al, “<strong><a href="http://www.academia.edu/download/40231907/mutualPaper.pdf">Mutual information based feature selection for intrusion detection. Network and Computer Application</a></strong>,,” Network and Computer Applications, vol. 34, no.1184–1199, p. 16, 2011.</p> <p style="text-align:justify;">[32] Horng S. J., Su M.-Y., Chen Y. H. et al., “A novel intrusion detection system based on hierarchical clustering and support vector machines.,” Expert Systems with Applications, vol. 306–313, p. 8, 2010.</p> <p style="text-align:justify;">[33] Akashdeep, I. Manzoor and N. Kumar, “A feature reduced intrusion detection system using ANN classifier,” Expert Systems With Applications, vol. 88, no. 249–257, p. 9, 2017.</p> <p style="text-align:justify;">[34] Nicholas J. Miller and Mehrdad Aliasgari, “<strong><a href="http://aircconline.com/ijnsa/V10N5/10518ijnsa01.pdf">Benchmarks for evaluating anomaly-based intrusion detection solutions</a></strong>,” International Journal of Network Security & Its Applications (IJNSA), vol. 10,no. 5, p. 12, September 2018.</p> <div id="atatags-370373-6742342ad509c"> <script type="text/javascript"> __ATA.cmd.push(function() { __ATA.initVideoSlot('atatags-370373-6742342ad509c', { sectionId: '370373', format: 'inread' }); }); </script> </div> <div id="atatags-26942-6742342ad5286"></div> <script> __ATA.cmd.push(function() { __ATA.initDynamicSlot({ id: 'atatags-26942-6742342ad5286', location: 120, formFactor: '001', label: { text: 'Advertisements', }, creative: { reportAd: { text: 'Report this ad', }, privacySettings: { text: 'Privacy', } } }); }); </script><div id="jp-post-flair" class="sharedaddy sd-like-enabled sd-sharing-enabled"><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-184" class="share-twitter sd-button share-icon" href="https://ijnsa2013.wordpress.com/recent-research-articles-in-intrusion-detection/?share=twitter" target="_blank" title="Click to share on Twitter" ><span>Twitter</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-184" class="share-facebook sd-button share-icon" href="https://ijnsa2013.wordpress.com/recent-research-articles-in-intrusion-detection/?share=facebook" target="_blank" title="Click to share on Facebook" ><span>Facebook</span></a></li><li class="share-end"></li></ul></div></div></div><div class='sharedaddy sd-block sd-like jetpack-likes-widget-wrapper jetpack-likes-widget-unloaded' id='like-post-wrapper-54868495-184-6742342ad6f0a' data-src='//widgets.wp.com/likes/index.html?ver=20241123#blog_id=54868495&post_id=184&origin=ijnsa2013.wordpress.com&obj_id=54868495-184-6742342ad6f0a' data-name='like-post-frame-54868495-184-6742342ad6f0a' data-title='Like or Reblog'><div class='likes-widget-placeholder post-likes-widget-placeholder' style='height: 55px;'><span class='button'><span>Like</span></span> <span class='loading'>Loading...</span></div><span class='sd-text-color'></span><a class='sd-link-color'></a></div></div> </div><!-- .entry-content --> </article><!-- #post-## --> </div><!-- #content --> </div><!-- #primary --> <div id="secondary" class="widget-area" role="complementary"> <div id="atatags-286348-6742342ad70e8"></div> <script> __ATA.cmd.push(function() { __ATA.initDynamicSlot({ id: 'atatags-286348-6742342ad70e8', location: 140, formFactor: '003', label: { text: 'Advertisements', }, creative: { reportAd: { text: 'Report this ad', }, privacySettings: { text: 'Privacy', } } }); }); </script> <aside id="search" class="widget widget_search"> <form method="get" id="searchform" class="searchform" action="https://ijnsa2013.wordpress.com/" role="search"> <label for="s" class="screen-reader-text">Search</label> <input type="search" class="field" name="s" value="" id="s" placeholder="Search …" /> <input type="submit" class="submit" id="searchsubmit" value="Search" /> </form> </aside> <aside id="archives" class="widget"> <h1 class="widget-title">Archives</h1> <ul> <li><a href='https://ijnsa2013.wordpress.com/2013/07/'>July 2013</a></li> </ul> </aside> <aside id="meta" class="widget"> <h1 class="widget-title">Meta</h1> <ul> <li><a href="https://wordpress.com/start?ref=wplogin">Register</a></li> <li><a href="https://ijnsa2013.wordpress.com/wp-login.php">Log in</a></li> </ul> </aside> </div><!-- #secondary --> </div><!-- #main --> <footer id="colophon" class="site-footer" role="contentinfo"> <div class="site-info"> <a href="https://wordpress.com/?ref=footer_website" rel="nofollow">Create a free website or blog at WordPress.com.</a> </div><!-- .site-info --> </footer><!-- #colophon --> </div><!-- #page --> </div><!-- #wrapper .site-container --> <!-- --> <script type="text/javascript" src="//0.gravatar.com/js/hovercards/hovercards.min.js?ver=2024474048849247f5660a2d05b85c6fc286379897f30a1061ad46e7f037e059ed7fe7" id="grofiles-cards-js"></script> <script type="text/javascript" id="wpgroho-js-extra"> /* <![CDATA[ */ var WPGroHo = {"my_hash":""}; /* ]]> */ </script> <script crossorigin='anonymous' type='text/javascript' src='https://s2.wp.com/wp-content/mu-plugins/gravatar-hovercards/wpgroho.js?m=1610363240i'></script> <script> // Initialize and attach hovercards to all gravatars ( function() { function init() { if ( typeof Gravatar === 'undefined' ) { return; } if ( typeof Gravatar.init !== 'function' ) { return; } Gravatar.profile_cb = function ( hash, id ) { WPGroHo.syncProfileData( hash, id ); }; Gravatar.my_hash = WPGroHo.my_hash; Gravatar.init( 'body', '#wp-admin-bar-my-account', { i18n: { 'Edit your profile': 'Edit your profile', 'View profile': 'View profile', 'Sorry, we are unable to load this Gravatar profile.': 'Sorry, we are unable to load this Gravatar profile.', 'Profile not found.': 'Profile not found.', 'Too Many Requests.': 'Too Many Requests.', 'Internal Server Error.': 'Internal Server Error.', }, } ); } if ( document.readyState !== 'loading' ) { init(); } else { document.addEventListener( 'DOMContentLoaded', init ); } } )(); </script> <div style="display:none"> </div> <script type="text/javascript"> ( function() { function init() { document.body.addEventListener( 'is.post-load', function() { if ( typeof __ATA.insertInlineAds === 'function' ) { __ATA.insertInlineAds(); } } ); } if ( document.readyState !== 'loading' ) { init(); } else { document.addEventListener( 'DOMContentLoaded', init ); } } )(); </script> <!-- CCPA [start] --> <script type="text/javascript"> ( function () { var setupPrivacy = function() { // Minimal Mozilla Cookie library // https://developer.mozilla.org/en-US/docs/Web/API/Document/cookie/Simple_document.cookie_framework var cookieLib = window.cookieLib = {getItem:function(e){return e&&decodeURIComponent(document.cookie.replace(new RegExp("(?:(?:^|.*;)\\s*"+encodeURIComponent(e).replace(/[\-\.\+\*]/g,"\\$&")+"\\s*\\=\\s*([^;]*).*$)|^.*$"),"$1"))||null},setItem:function(e,o,n,t,r,i){if(!e||/^(?:expires|max\-age|path|domain|secure)$/i.test(e))return!1;var c="";if(n)switch(n.constructor){case Number:c=n===1/0?"; expires=Fri, 31 Dec 9999 23:59:59 GMT":"; max-age="+n;break;case String:c="; expires="+n;break;case Date:c="; expires="+n.toUTCString()}return"rootDomain"!==r&&".rootDomain"!==r||(r=(".rootDomain"===r?".":"")+document.location.hostname.split(".").slice(-2).join(".")),document.cookie=encodeURIComponent(e)+"="+encodeURIComponent(o)+c+(r?"; domain="+r:"")+(t?"; path="+t:"")+(i?"; secure":""),!0}}; // Implement IAB USP API. window.__uspapi = function( command, version, callback ) { // Validate callback. if ( typeof callback !== 'function' ) { return; } // Validate the given command. if ( command !== 'getUSPData' || version !== 1 ) { callback( null, false ); return; } // Check for GPC. If set, override any stored cookie. if ( navigator.globalPrivacyControl ) { callback( { version: 1, uspString: '1YYN' }, true ); return; } // Check for cookie. var consent = cookieLib.getItem( 'usprivacy' ); // Invalid cookie. if ( null === consent ) { callback( null, false ); return; } // Everything checks out. Fire the provided callback with the consent data. callback( { version: 1, uspString: consent }, true ); }; // Initialization. document.addEventListener( 'DOMContentLoaded', function() { // Internal functions. var setDefaultOptInCookie = function() { var value = '1YNN'; var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'usprivacy', value, 365 * 24 * 60 * 60, '/', domain ); }; var setDefaultOptOutCookie = function() { var value = '1YYN'; var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'usprivacy', value, 24 * 60 * 60, '/', domain ); }; var setDefaultNotApplicableCookie = function() { var value = '1---'; var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'usprivacy', value, 24 * 60 * 60, '/', domain ); }; var setCcpaAppliesCookie = function( applies ) { var domain = '.wordpress.com' === location.hostname.slice( -14 ) ? '.rootDomain' : location.hostname; cookieLib.setItem( 'ccpa_applies', applies, 24 * 60 * 60, '/', domain ); } var maybeCallDoNotSellCallback = function() { if ( 'function' === typeof window.doNotSellCallback ) { return window.doNotSellCallback(); } return false; } // Look for usprivacy cookie first. var usprivacyCookie = cookieLib.getItem( 'usprivacy' ); // Found a usprivacy cookie. if ( null !== usprivacyCookie ) { // If the cookie indicates that CCPA does not apply, then bail. if ( '1---' === usprivacyCookie ) { return; } // CCPA applies, so call our callback to add Do Not Sell link to the page. maybeCallDoNotSellCallback(); // We're all done, no more processing needed. return; } // We don't have a usprivacy cookie, so check to see if we have a CCPA applies cookie. var ccpaCookie = cookieLib.getItem( 'ccpa_applies' ); // No CCPA applies cookie found, so we'll need to geolocate if this visitor is from California. // This needs to happen client side because we do not have region geo data in our $SERVER headers, // only country data -- therefore we can't vary cache on the region. if ( null === ccpaCookie ) { var request = new XMLHttpRequest(); request.open( 'GET', 'https://public-api.wordpress.com/geo/', true ); request.onreadystatechange = function () { if ( 4 === this.readyState ) { if ( 200 === this.status ) { // Got a geo response. Parse out the region data. var data = JSON.parse( this.response ); var region = data.region ? data.region.toLowerCase() : ''; var ccpa_applies = ['california', 'colorado', 'connecticut', 'delaware', 'indiana', 'iowa', 'montana', 'new jersey', 'oregon', 'tennessee', 'texas', 'utah', 'virginia'].indexOf( region ) > -1; // Set CCPA applies cookie. This keeps us from having to make a geo request too frequently. setCcpaAppliesCookie( ccpa_applies ); // Check if CCPA applies to set the proper usprivacy cookie. if ( ccpa_applies ) { if ( maybeCallDoNotSellCallback() ) { // Do Not Sell link added, so set default opt-in. setDefaultOptInCookie(); } else { // Failed showing Do Not Sell link as required, so default to opt-OUT just to be safe. setDefaultOptOutCookie(); } } else { // CCPA does not apply. setDefaultNotApplicableCookie(); } } else { // Could not geo, so let's assume for now that CCPA applies to be safe. setCcpaAppliesCookie( true ); if ( maybeCallDoNotSellCallback() ) { // Do Not Sell link added, so set default opt-in. setDefaultOptInCookie(); } else { // Failed showing Do Not Sell link as required, so default to opt-OUT just to be safe. setDefaultOptOutCookie(); } } } }; // Send the geo request. request.send(); } else { // We found a CCPA applies cookie. if ( ccpaCookie === 'true' ) { if ( maybeCallDoNotSellCallback() ) { // Do Not Sell link added, so set default opt-in. setDefaultOptInCookie(); } else { // Failed showing Do Not Sell link as required, so default to opt-OUT just to be safe. setDefaultOptOutCookie(); } } else { // CCPA does not apply. setDefaultNotApplicableCookie(); } } } ); }; // Kickoff initialization. if ( window.defQueue && defQueue.isLOHP && defQueue.isLOHP === 2020 ) { defQueue.items.push( setupPrivacy ); } else { setupPrivacy(); } } )(); </script> <!-- CCPA [end] --> <div class="widget widget_eu_cookie_law_widget"> <div class="hide-on-button ads-active" data-hide-timeout="30" data-consent-expiration="180" id="eu-cookie-law" style="display: none" > <form method="post"> <input type="submit" value="Close and accept" class="accept" /> Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br /> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies/" rel="nofollow"> Cookie Policy </a> </form> </div> </div> <div id="actionbar" style="display: none;" class="actnbr-pub-adelle actnbr-has-follow"> <ul> <li class="actnbr-btn actnbr-hidden"> <a class="actnbr-action actnbr-actn-follow " href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path clip-rule="evenodd" d="m4 4.5h12v6.5h1.5v-6.5-1.5h-1.5-12-1.5v1.5 10.5c0 1.1046.89543 2 2 2h7v-1.5h-7c-.27614 0-.5-.2239-.5-.5zm10.5 2h-9v1.5h9zm-5 3h-4v1.5h4zm3.5 1.5h-1v1h1zm-1-1.5h-1.5v1.5 1 1.5h1.5 1 1.5v-1.5-1-1.5h-1.5zm-2.5 2.5h-4v1.5h4zm6.5 1.25h1.5v2.25h2.25v1.5h-2.25v2.25h-1.5v-2.25h-2.25v-1.5h2.25z" fill-rule="evenodd"></path></svg> <span>Subscribe</span> </a> <a class="actnbr-action actnbr-actn-following no-display" href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path fill-rule="evenodd" clip-rule="evenodd" d="M16 4.5H4V15C4 15.2761 4.22386 15.5 4.5 15.5H11.5V17H4.5C3.39543 17 2.5 16.1046 2.5 15V4.5V3H4H16H17.5V4.5V12.5H16V4.5ZM5.5 6.5H14.5V8H5.5V6.5ZM5.5 9.5H9.5V11H5.5V9.5ZM12 11H13V12H12V11ZM10.5 9.5H12H13H14.5V11V12V13.5H13H12H10.5V12V11V9.5ZM5.5 12H9.5V13.5H5.5V12Z" fill="#008A20"></path><path class="following-icon-tick" d="M13.5 16L15.5 18L19 14.5" stroke="#008A20" stroke-width="1.5"></path></svg> <span>Subscribed</span> </a> <div class="actnbr-popover tip tip-top-left actnbr-notice" id="follow-bubble"> <div class="tip-arrow"></div> <div class="tip-inner actnbr-follow-bubble"> <ul> <li class="actnbr-sitename"> <a href="https://ijnsa2013.wordpress.com"> <img loading='lazy' alt='' src='https://s2.wp.com/i/logo/wpcom-gray-white.png' srcset='https://s2.wp.com/i/logo/wpcom-gray-white.png 1x' class='avatar avatar-50' height='50' width='50' /> ijnsa </a> </li> <div class="actnbr-message no-display"></div> <form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;"> <div> <input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address" /> </div> <input type="hidden" name="action" value="subscribe" /> <input type="hidden" name="blog_id" value="54868495" /> <input type="hidden" name="source" value="https://ijnsa2013.wordpress.com/recent-research-articles-in-intrusion-detection/" /> <input type="hidden" name="sub-type" value="actionbar-follow" /> <input type="hidden" id="_wpnonce" name="_wpnonce" value="0e2ac151db" /> <div class="actnbr-button-wrap"> <button type="submit" value="Sign me up"> Sign me up </button> </div> </form> <li class="actnbr-login-nudge"> <div> Already have a WordPress.com account? <a href="https://wordpress.com/log-in?redirect_to=https%3A%2F%2Fijnsa2013.wordpress.com%2Frecent-research-articles-in-intrusion-detection%2F&signup_flow=account">Log in now.</a> </div> </li> </ul> </div> </div> </li> <li class="actnbr-ellipsis actnbr-hidden"> <svg class="gridicon gridicons-ellipsis" height="24" width="24" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><g><path d="M7 12c0 1.104-.896 2-2 2s-2-.896-2-2 .896-2 2-2 2 .896 2 2zm12-2c-1.104 0-2 .896-2 2s.896 2 2 2 2-.896 2-2-.896-2-2-2zm-7 0c-1.104 0-2 .896-2 2s.896 2 2 2 2-.896 2-2-.896-2-2-2z"/></g></svg> <div class="actnbr-popover tip tip-top-left actnbr-more"> <div class="tip-arrow"></div> <div class="tip-inner"> <ul> <li class="actnbr-sitename"> <a href="https://ijnsa2013.wordpress.com"> <img loading='lazy' alt='' src='https://s2.wp.com/i/logo/wpcom-gray-white.png' srcset='https://s2.wp.com/i/logo/wpcom-gray-white.png 1x' class='avatar avatar-50' height='50' width='50' /> ijnsa </a> </li> <li class="actnbr-folded-customize"> <a href="https://ijnsa2013.wordpress.com/wp-admin/customize.php?url=https%3A%2F%2Fijnsa2013.wordpress.com%2Frecent-research-articles-in-intrusion-detection%2F"> <svg class="gridicon gridicons-customize" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><g><path d="M2 6c0-1.505.78-3.08 2-4 0 .845.69 2 2 2 1.657 0 3 1.343 3 3 0 .386-.08.752-.212 1.09.74.594 1.476 1.19 2.19 1.81L8.9 11.98c-.62-.716-1.214-1.454-1.807-2.192C6.753 9.92 6.387 10 6 10c-2.21 0-4-1.79-4-4zm12.152 6.848l1.34-1.34c.607.304 1.283.492 2.008.492 2.485 0 4.5-2.015 4.5-4.5 0-.725-.188-1.4-.493-2.007L18 9l-2-2 3.507-3.507C18.9 3.188 18.225 3 17.5 3 15.015 3 13 5.015 13 7.5c0 .725.188 1.4.493 2.007L3 20l2 2 6.848-6.848c1.885 1.928 3.874 3.753 5.977 5.45l1.425 1.148 1.5-1.5-1.15-1.425c-1.695-2.103-3.52-4.092-5.448-5.977z"/></g></svg> <span>Customize</span> </a> </li> <li class="actnbr-folded-follow"> <a class="actnbr-action actnbr-actn-follow " href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path clip-rule="evenodd" d="m4 4.5h12v6.5h1.5v-6.5-1.5h-1.5-12-1.5v1.5 10.5c0 1.1046.89543 2 2 2h7v-1.5h-7c-.27614 0-.5-.2239-.5-.5zm10.5 2h-9v1.5h9zm-5 3h-4v1.5h4zm3.5 1.5h-1v1h1zm-1-1.5h-1.5v1.5 1 1.5h1.5 1 1.5v-1.5-1-1.5h-1.5zm-2.5 2.5h-4v1.5h4zm6.5 1.25h1.5v2.25h2.25v1.5h-2.25v2.25h-1.5v-2.25h-2.25v-1.5h2.25z" fill-rule="evenodd"></path></svg> <span>Subscribe</span> </a> <a class="actnbr-action actnbr-actn-following no-display" href=""> <svg class="gridicon" height="20" width="20" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20"><path fill-rule="evenodd" clip-rule="evenodd" d="M16 4.5H4V15C4 15.2761 4.22386 15.5 4.5 15.5H11.5V17H4.5C3.39543 17 2.5 16.1046 2.5 15V4.5V3H4H16H17.5V4.5V12.5H16V4.5ZM5.5 6.5H14.5V8H5.5V6.5ZM5.5 9.5H9.5V11H5.5V9.5ZM12 11H13V12H12V11ZM10.5 9.5H12H13H14.5V11V12V13.5H13H12H10.5V12V11V9.5ZM5.5 12H9.5V13.5H5.5V12Z" fill="#008A20"></path><path class="following-icon-tick" d="M13.5 16L15.5 18L19 14.5" stroke="#008A20" stroke-width="1.5"></path></svg> <span>Subscribed</span> </a> </li> <li class="actnbr-signup"><a href="https://wordpress.com/start/">Sign up</a></li> <li class="actnbr-login"><a href="https://wordpress.com/log-in?redirect_to=https%3A%2F%2Fijnsa2013.wordpress.com%2Frecent-research-articles-in-intrusion-detection%2F&signup_flow=account">Log in</a></li> <li class="actnbr-shortlink"><a href="https://wp.me/P3IdNJ-2Y">Copy shortlink</a></li> <li class="flb-report"> <a href="https://wordpress.com/abuse/?report_url=https://ijnsa2013.wordpress.com/recent-research-articles-in-intrusion-detection/" target="_blank" rel="noopener noreferrer"> Report this content </a> </li> <li class="actnbr-reader"> <a href="https://wordpress.com/read/blogs/54868495/posts/184"> View post in Reader </a> </li> <li class="actnbr-subs"> <a href="https://subscribe.wordpress.com/">Manage subscriptions</a> </li> <li class="actnbr-fold"><a href="">Collapse this bar</a></li> </ul> </div> </div> </li> </ul> </div> <script> window.addEventListener( "load", function( event ) { var link = document.createElement( "link" ); link.href = "https://s0.wp.com/wp-content/mu-plugins/actionbar/actionbar.css?v=20241015"; link.type = "text/css"; link.rel = "stylesheet"; document.head.appendChild( link ); var script = document.createElement( "script" ); script.src = "https://s0.wp.com/wp-content/mu-plugins/actionbar/actionbar.js?v=20231122"; script.defer = true; document.body.appendChild( script ); } ); </script> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/ijnsa2013.wordpress.com\/recent-research-articles-in-intrusion-detection\/":184}; </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script crossorigin='anonymous' type='text/javascript' src='https://s1.wp.com/_static/??-eJyNkMFOxDAMRH+IrFl1V4gD4lOQm7ipW8cJdULZv6dFSKAeVtzs8ZvRyLAW57NW0gqTQco9C7lmtGDcNMc65NNkD/CH6yVHV6RFVoM1LwGDOS9oRraHrFjl6Ent18EhUjWgtl3zzOQEV6iUimClg34nR3je6PdGjUbUILQc4TpS2pDSesBAIrS3U/zgiJWz/gu3mYsT1tkN2TdzA3/e6TRRLejnnx2sKbyxeugbSwAbcaHtW+H2PbLGU+K9xmt6OT9150v32F2fpy9vo5Zh'></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function () { var wpcom_reblog = { source: 'toolbar', toggle_reblog_box_flair: function (obj_id, post_id) { // Go to site selector. This will redirect to their blog if they only have one. const postEndpoint = `https://wordpress.com/post`; // Ideally we would use the permalink here, but fortunately this will be replaced with the // post permalink in the editor. const originalURL = `${ document.location.href }?page_id=${ post_id }`; const url = postEndpoint + '?url=' + encodeURIComponent( originalURL ) + '&is_post_share=true' + '&v=5'; const redirect = function () { if ( ! window.open( url, '_blank' ) ) { location.href = url; } }; if ( /Firefox/.test( navigator.userAgent ) ) { setTimeout( redirect, 0 ); } else { redirect(); } }, }; window.wpcom_reblog = wpcom_reblog; })(); </script> <script type="text/javascript"> // <![CDATA[ (function() { try{ if ( window.external &&'msIsSiteMode' in window.external) { if (window.external.msIsSiteMode()) { var jl = document.createElement('script'); jl.type='text/javascript'; jl.async=true; jl.src='/wp-content/plugins/ie-sitemode/custom-jumplist.php'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(jl, s); } } }catch(e){} })(); // ]]> </script> <iframe src='https://widgets.wp.com/likes/master.html?ver=20241123#ver=20241123&origin=https://ijnsa2013.wordpress.com' scrolling='no' id='likes-master' name='likes-master' style='display:none;'></iframe> <div id='likes-other-gravatars' class='wpl-new-layout' role="dialog" aria-hidden="true" tabindex="-1"> <div class="likes-text"> <span>%d</span> </div> <ul class="wpl-avatars sd-like-gravatars"></ul> </div> <script src="//stats.wp.com/w.js?67" defer></script> <script type="text/javascript"> _tkq = window._tkq || []; _stq = window._stq || []; _tkq.push(['storeContext', {'blog_id':'54868495','blog_tz':'0','user_lang':'en','blog_lang':'en','user_id':'0'}]); _stq.push(['view', {'blog':'54868495','v':'wpcom','tz':'0','user_id':'0','post':'184','subd':'ijnsa2013'}]); _stq.push(['extra', {'crypt':'UE5XaGUuOTlwaD85flAmcm1mcmZsaDhkV11YdWFnNncxc1tjZG9XVXhRZmhSYUFEMXVJdlp1Q2dGaT0lXXxFb1QrX1VxRFQlWD9McXxoNm1LblY0MkNfa0Y2SUY9Nm1idyxpa1lEL3l6dTIlUlYwLm85JkFNP05wWW9pYnhZOVV0JWRnVkF+UUZhdGxfPWxjP3JbSUJsTUkxY3h+VXc1bl9SeURraDdSc2ZsVUdEaVkzL34ubTBDMVJmYkxEL1EtYUxjV3lrTixVbURGUytwekl+VGdHY3phTnBHYWElcERkL1suSUZQOHJ5Wm5rQjVIbmxHWVtqXXUrVjEyUDcxTFZDZHNmWA=='}]); _stq.push([ 'clickTrackerInit', '54868495', '184' ]); </script> <noscript><img src="https://pixel.wp.com/b.gif?v=noscript" style="height:1px;width:1px;overflow:hidden;position:absolute;bottom:1px;" alt="" /></noscript> <div id="marketingbar" class="marketing-bar noskim "><div class="marketing-bar-text">Design a site like this with WordPress.com</div><a class="marketing-bar-button" href="https://wordpress.com/start/?ref=marketing_bar">Get started</a><a class="marketing-bar-link" tabindex="-1" aria-label="Create your website at WordPress.com" href="https://wordpress.com/start/?ref=marketing_bar"></a></div> <script type="text/javascript"> window._tkq = window._tkq || []; window._tkq.push( [ 'recordEvent', 'wpcom_marketing_bar_impression', {"is_current_user_blog_owner":false} ] ); document.querySelectorAll( '#marketingbar > a' ).forEach( link => { link.addEventListener( 'click', ( e ) => { window._tkq.push( [ 'recordEvent', 'wpcom_marketing_bar_cta_click', {"is_current_user_blog_owner":false} ] ); } ); }); </script><script> ( function() { function getMobileUserAgentInfo() { if ( typeof wpcom_mobile_user_agent_info === 'object' ) { wpcom_mobile_user_agent_info.init(); var mobileStatsQueryString = ''; if ( wpcom_mobile_user_agent_info.matchedPlatformName !== false ) { mobileStatsQueryString += '&x_' + 'mobile_platforms' + '=' + wpcom_mobile_user_agent_info.matchedPlatformName; } if ( wpcom_mobile_user_agent_info.matchedUserAgentName !== false ) { mobileStatsQueryString += '&x_' + 'mobile_devices' + '=' + wpcom_mobile_user_agent_info.matchedUserAgentName; } if ( wpcom_mobile_user_agent_info.isIPad() ) { mobileStatsQueryString += '&x_' + 'ipad_views' + '=' + 'views'; } if ( mobileStatsQueryString != '' ) { new Image().src = document.location.protocol + '//pixel.wp.com/g.gif?v=wpcom-no-pv' + mobileStatsQueryString + '&baba=' + Math.random(); } } } document.addEventListener( 'DOMContentLoaded', getMobileUserAgentInfo ); } )(); </script> </body> </html>