ICSES Transactions on Computer Networks and Communications
Vol. 1, No. 2, Nov. 2015
A Novel Optimum Approach for Misuse Detection | Original Paper
|
Editors' Choice |
Original Paper |
|
2k Visits |
787 Downloads |
a Masjed-Soleiman Branch, Islamic Azad University (I.A.U), Masjed-Soleiman, Iran
Eng. AbdolHamid MomenZadeh
Corresponding Author Affiliation: Masjed-Soleiman Branch, Islamic Azad University (I.A.U), Masjed-Soleiman, Iran Tel: +989166810031 E-mail: momenzadeh.hamid@gmail.com Eng. AbdolHamid MomenZadeh's publications in ICSES
- A Novel Job Scheduler for Computational Grid Using Simulated Annealing Heuristic
ICSES Transactions on Evolutionary and Metaheuristic Algorithms Original Paper | Vol. 1, No. 1 | Pages 6-13 | Nov. 2015 Hamid Saadi, AbdolHamid MomenZadeh, Ehsan PourAliAkbar, et al. - A Novel Optimum Approach for Misuse Detection
ICSES Transactions on Computer Networks and Communications Original Paper | Vol. 1, No. 2 | Pages 1-6 | Nov. 2015 AbdolHamid MomenZadeh - A New Technique by Design an Efficient System for Intrusion Detection
ICSES Transactions on Computer Networks and Communications Original Paper | Vol. 1, No. 2 | Pages 7-11 | Nov. 2015 AbdolHamid MomenZadeh - Network Lifetime Enhancement by a New Clustering Method in Wireless Sensor Networks
ICSES Transactions on Computer Networks and Communications Original Paper | Vol. 1, No. 2 | Pages 12-16 | Nov. 2015 Ehsan PourAliAkbar, AbdolHamid MomenZadeh, Hamid Saadi, et al.
|
This article has been retracted by International Computer Science and Engineering Society (ICSES) because of ethical misconduct, scientific distortion, or administrative error, and cannot be downloaded and used for any purpose based on the violation in ICSES Ethics in Publicationcall_made |
Retraction Note by the Editor-in-Chief
Highlights and Novelties
No Highlights!
Manuscript Abstract
Detect Intrusion is an indispensable part of a security system. Activity of network becomes an essential part in modern life; on the other hand, number of threats and attacks in private and corporate networks are increasing. Therefore, there is a need for a performance method for detecting of intrusion networks. Detect of intrusion is defined by the problem of identifying misuse and abuse in computer systems. In this paper, a novel fuzzy-evolutionary system is presented to effectively detect the intrusion in networks at computer. So this scheme employs a hybridization of fake annealing empirical and tabu search procedure to recover the accuracy of fuzzy if-then guidelines as intrusion gauges. Both of these systems have its beneficial and detrimental. So, using the cross models of both routes, the anticipated classification occupations the good structures of them to progress the exactness of gained rules. Valuation of the future system is done on the dataset which has info about standard and intrusive activities in linkages. Rests of our archetypal have been matched with quite a few well-known intrusion recognition systems.
Keywords
Component intrusion detection simulated annealing search fuzzy if-then rules.
Copyright and Licence
© Copyright was transferred to International Computer Science and Engineering Society (ICSES) by all the Authors. This manuscript is published in Open-Access manner based on the copyright licence of Creative Commons Attribution Non Commercial 4.0 International (CC BY-NC 4.0).
Cite this manuscript as
AbdolHamid MomenZadeh, "A Novel Optimum Approach for Misuse Detection," ICSES Transactions on Computer Networks and Communications, vol. 1, no. 2, pp. 1-6, Nov. 2015.
For External Scientific Databeses
--BibTex--
@article{al._-13 title="A Novel Optimum Approach for Misuse Detection", author="AbdolHamid MomenZadeh", journal="ICSES Transactions on Computer Networks and Communications (ITCNC)", volume="1", number="2", pages="1-6", year="2015", month="11", day="01", publisher= "International Computer Science and Engineering Society (ICSES)", doi="", url="http://www.i-cses.com/files/download.php?pID=-13"}
--EndNote--
%0 Journal Article %T A Novel Optimum Approach for Misuse Detection %A AbdolHamid MomenZadeh %J ICSES Transactions on Computer Networks and Communications (ITCNC) %V 1 %N 2 %P 1-6 %D 2015 %I International Computer Science and Engineering Society (ICSES) %U http://www.i-cses.com/files/download.php?pID=-13 %8 2015-11-30 %R %@ 2588-5847
--Dublin--
< name="citation_title" content="A Novel Optimum Approach for Misuse Detection">
< name="citation_author" content="AbdolHamid MomenZadeh">
< name="citation_publication_date" content="2015-11-30">
< name="citation_journal_title" content="ICSES Transactions on Computer Networks and Communications (ITCNC)">
< name="citation_issn" content="2588-5847">
< name="citation_volume" content="1">
< name="citation_issue" content="2">
< name="citation_firstpage" content="1">
< name="citation_lastpage" content="6">
< name="citation_pdf_url" content="http://www.i-cses.com/files/download.php?pID=-13">
|