메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 1231-1236

Detecting denial of service attacks using support vector machines

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; CLIENT SERVER COMPUTER SYSTEMS; DATA MINING; KNOWLEDGE BASED SYSTEMS; LEARNING SYSTEMS; LOCAL AREA NETWORKS; NEURAL NETWORKS; VECTORS; WORLD WIDE WEB;

EID: 0037860750     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (64)

References (36)
  • 2
    • 0038119028 scopus 로고
    • Hackers - Heroes of the computer revolution
    • S. Levy, "Hackers - Heroes of the Computer Revolution," Dell, 1984.
    • (1984) Dell
    • Levy, S.1
  • 3
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • June
    • Lunt and F. Teresa, "A Survey of Intrusion Detection Techniques," Computers and Security 12, 4 (June 1993), pp. 405-418.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt1    Teresa, F.2
  • 5
    • 0034247240 scopus 로고    scopus 로고
    • Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    • Luo, Jianxiong, and S. M. Bridges, "Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection," International Journal of Intelligent Systems, Vol. 15, No. 8, 2000, pp. 687-704
    • (2000) International Journal of Intelligent Systems , vol.15 , Issue.8 , pp. 687-704
    • Jianxiong, L.1    Bridges, S.M.2
  • 7
    • 0037781371 scopus 로고
    • An interdisciplinary approach for adding knowledge to computer security systems
    • M. Toure, "An Interdisciplinary Approach for Adding Knowledge to Computer Security Systems," IEEE Carnahan Conference on Security Technology, 1994.
    • (1994) IEEE Carnahan Conference on Security Technology
    • Toure, M.1
  • 8
    • 0027150412 scopus 로고
    • USTAT: A real-time intrusion detection system for UNIX
    • Oakland, California, May 24-26. Los Alamitos, CA: IEEE Computer Society Press, 1993
    • Ilgun and Koral, "USTAT: A Real-time Intrusion Detection System for UNIX," Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy. Oakland, California, May 24-26, 1993. Los Alamitos, CA: IEEE Computer Society Press, 1993.
    • (1993) Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy
    • Ilgun1    Koral2
  • 11
    • 0025548907 scopus 로고
    • Security audit trail analysis using inductively generated predictive rules
    • Santa Barbara, CA, May 5-9. Los Alamitos, CA: IEEE Computer Society Press, 1990
    • H. S. Teng, K. Chen and C. Lu. Stephen, "Security Audit Trail Analysis Using Inductively Generated Predictive Rules," Sixth Conference on Artificial Intelligence Applications. Santa Barbara, CA, May 5-9, 1990. Los Alamitos, CA: IEEE Computer Society Press, 1990.
    • (1990) Sixth Conference on Artificial Intelligence Applications
    • Teng, H.S.1    Chen, K.2    Stephen, C.Lu.3
  • 12
    • 0038118997 scopus 로고
    • Computer security
    • New York, NY: John Wiley and Sons
    • Kemmerer, A. Richard, "Computer Security," Encyclopedia of Software Engineering. New York, NY: John Wiley and Sons, 1994, pp. 1153-1164.
    • (1994) Encyclopedia of Software Engineering , pp. 1153-1164
    • Kemmerer, A.R.1
  • 20
    • 0002365658 scopus 로고    scopus 로고
    • Learning program behavior profiles for intrusion detection
    • A. K. Ghosh, "Learning Program Behavior Profiles for Intrusion Detection," USENIX, 1999.
    • (1999) USENIX
    • Ghosh, A.K.1
  • 22
    • 0038458235 scopus 로고    scopus 로고
    • Defending a computer system using autonomous agents
    • M. Crosbie and E. Spafford, "Defending a Computer System Using Autonomous Agents," Technical Report CSD-TR-95-022.
    • Technical Report , vol.CSD-TR-95-022
    • Crosbie, M.1    Spafford, E.2
  • 23
    • 4244169431 scopus 로고    scopus 로고
    • Agent-based distributed learning applied to fraud detection
    • L. Prodromidis, S. J. Stolfo, "Agent-Based Distributed Learning Applied to Fraud Detection," Technical Report, CUCS-014-99.
    • Technical Report , vol.CUCS-014-99
    • Prodromidis, L.1    Stolfo, S.J.2
  • 26
    • 85141038051 scopus 로고    scopus 로고
    • Mining audit data to build intrusion detection models
    • honorable mention best application paper, August
    • W. Lee, S. J. Stolfo, and K. Mok, "Mining Audit Data to Build Intrusion Detection Models," Proc. KDD-98, honorable mention best application paper, August 1998.
    • (1998) Proc. KDD-98
    • Lee, W.1    Stolfo, S.J.2    Mok, K.3
  • 28
    • 0037781361 scopus 로고    scopus 로고
    • Audit data reduction using neural networks and support vector machines
    • August 7-9, Syracuse University, Center for Systems Assurance
    • S. Mukkamala, A. H. Sung, "Audit Data Reduction Using Neural Networks and Support Vector Machines," Digital Forensics Research Workshop (DFRWS-2002), August 7-9, 2002, Syracuse University, Center for Systems Assurance.
    • (2002) Digital Forensics Research Workshop (DFRWS-2002)
    • Mukkamala, S.1    Sung, A.H.2
  • 32
    • 0038119011 scopus 로고    scopus 로고
    • Distributed denial of service characterization
    • Sandia National Laboratories
    • T. Draelos, et. Al, "Distributed Denial of Service Characterization," Technical Report, Sandia National Laboratories, 2003.
    • (2003) Technical Report
    • Draelos, T.1
  • 36
    • 0000671231 scopus 로고    scopus 로고
    • Ranking importance of input parameters of neural networks
    • A. H. Sung, "Ranking Importance of Input Parameters of Neural Networks," Expert Systems with Applications, pp.405-41, 1998.
    • (1998) Expert Systems with Applications , pp. 405-441
    • Sung, A.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.