scispace - formally typeset
K

K. Anusha

Researcher at VIT University

Publications -  9
Citations -  33

K. Anusha is an academic researcher from VIT University. The author has contributed to research in topics: Intrusion detection system & Anomaly-based intrusion detection system. The author has an hindex of 3, co-authored 9 publications receiving 28 citations.

Papers
More filters
Journal ArticleDOI

Comparative study for feature selection algorithms in intrusion detection system

TL;DR: This paper identifies the best feature selection algorithm to select the important and useful features from the network dataset by identifying the optimal feature selection methods for intrusion detection.
Journal ArticleDOI

OMAMIDS: Ontology Based Multi-Agent Model Intrusion Detection System for Detecting Web Service Attacks

TL;DR: An Ontology-based Multi-Agent Model Intrusion Detection System (OMAMIDS) for detecting web service attacks achieves high detection rate and accuracy and lower false positive rate than the existing techniques.
Journal ArticleDOI

A new trust-based mechanism for detecting intrusions in MANET

TL;DR: A Trust-Based Authentication Routing with Bio-Inspired Intrusion Detection System (TRAB-IDS) is developed, where the trust and deep packet inspection (DPI) concepts are integrated for improving the security.
Journal ArticleDOI

A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system

TL;DR: A combined particle swarm optimisation with genetic algorithm CPSO-GA approach to improve the intrusion detection accuracy and achieves higher intrusion detection rate and lesser error percentage than the existing feature selection algorithms and decision tree classifiers.

An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy

TL;DR: This paper proposes to detect the attack by using an Intrusion detection system that uses intuitionistic fuzzy logic which aims to detect distrust behavior of node and identify the attacks if it seems to be an attack based on given rules.