K
K. Anusha
Researcher at VIT University
Publications - 9
Citations - 33
K. Anusha is an academic researcher from VIT University. The author has contributed to research in topics: Intrusion detection system & Anomaly-based intrusion detection system. The author has an hindex of 3, co-authored 9 publications receiving 28 citations.
Papers
More filters
Journal ArticleDOI
Comparative study for feature selection algorithms in intrusion detection system
K. Anusha,E. Sathiyamoorthy +1 more
TL;DR: This paper identifies the best feature selection algorithm to select the important and useful features from the network dataset by identifying the optimal feature selection methods for intrusion detection.
Journal ArticleDOI
OMAMIDS: Ontology Based Multi-Agent Model Intrusion Detection System for Detecting Web Service Attacks
K. Anusha,E. Sathiyamoorthy +1 more
TL;DR: An Ontology-based Multi-Agent Model Intrusion Detection System (OMAMIDS) for detecting web service attacks achieves high detection rate and accuracy and lower false positive rate than the existing techniques.
Journal ArticleDOI
A new trust-based mechanism for detecting intrusions in MANET
K. Anusha,E. Sathiyamoorthy +1 more
TL;DR: A Trust-Based Authentication Routing with Bio-Inspired Intrusion Detection System (TRAB-IDS) is developed, where the trust and deep packet inspection (DPI) concepts are integrated for improving the security.
Journal ArticleDOI
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system
K. Anusha,E. Sathiyamoorthy +1 more
TL;DR: A combined particle swarm optimisation with genetic algorithm CPSO-GA approach to improve the intrusion detection accuracy and achieves higher intrusion detection rate and lesser error percentage than the existing feature selection algorithms and decision tree classifiers.
An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy
TL;DR: This paper proposes to detect the attack by using an Intrusion detection system that uses intuitionistic fuzzy logic which aims to detect distrust behavior of node and identify the attacks if it seems to be an attack based on given rules.