메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 1266-1271

Artificial intelligent techniques for intrusion detection

Author keywords

Artificial intelligent techniques; Intrusion detection; Neural networks; Support vector machines and computer security

Indexed keywords

ARTIFICIAL INTELLIGENCE; BACKPROPAGATION; COMPUTER NETWORKS; COMPUTER SIMULATION; LEARNING SYSTEMS; NETWORK PROTOCOLS; TELECOMMUNICATION TRAFFIC;

EID: 0242408742     PISSN: 08843627     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (22)
  • 4
    • 0038458235 scopus 로고
    • Defending a computer system using autonomous agents
    • Technical Report CSD-TR-95-022
    • M. Crosbie and E. H. Spafford, "Defending a Computer System Using Autonomous Agents", Technical Report CSD-TR-95-022, 1995.
    • (1995)
    • Crosbie, M.1    Spafford, E.H.2
  • 9
    • 0003798642 scopus 로고    scopus 로고
    • Making large-scale SVM learning practical
    • LS8-Report, University of Dortmund, LS VIII-Report
    • T. Joachims, "Making Large-Scale SVM Learning Practical", LS8-Report, University of Dortmund, LS VIII-Report, 2000.
    • (2000)
    • Joachims, T.1
  • 10
    • 0003583743 scopus 로고    scopus 로고
    • SVMlight is an implementation of support vector machines (SVMs) in C
    • University of Dortmund. Collaborative Research Center on Complexity Reduction in Multivariate Data (SFB475)
    • T. Joachims, "SVMlight is an Implementation of Support Vector Machines (SVMs) in C", http://ais.gmd.de/~thorsten/svm_light. University of Dortmund. Collaborative Research Center on Complexity Reduction in Multivariate Data (SFB475), 2000.
    • (2000)
    • Joachims, T.1
  • 11
    • 0004204715 scopus 로고    scopus 로고
    • A database of computer attacks for the evaluation of intrusion detection systems
    • Master's Thesis, Massachusetts Institute of Technology
    • K. Kendall, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems", Master's Thesis, Massachusetts Institute of Technology, 1998.
    • (1998)
    • Kendall, K.1
  • 12
    • 0003900915 scopus 로고
    • An application of pattern matching in intrusion detection
    • Technical Report CSD-TR-94-013. Purdue University
    • S. Kumar, and E. H. Spafford, "An Application of Pattern Matching in Intrusion Detection", Technical Report CSD-TR-94-013. Purdue University, 1994.
    • (1994)
    • Kumar, S.1    Spafford, E.H.2
  • 13
    • 0034247240 scopus 로고    scopus 로고
    • Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    • John Wiley & Sons
    • J. Luo, and S. M. Bridges, "Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection", International Journal of Intelligent Systems, John Wiley & Sons, Vol. 15, No. 8, pp.687-704, 2000.
    • (2000) International Journal of Intelligent Systems , vol.15 , Issue.8 , pp. 687-704
    • Luo, J.1    Bridges, S.M.2
  • 16
    • 4244169431 scopus 로고    scopus 로고
    • Agent-based distributed learning applied to fraud detection
    • Technical Report, CUCS-014-99
    • L. Prodromidis and S. J. Stolfo, "Agent-Based Distributed Learning Applied to Fraud Detection", Technical Report, CUCS-014-99, 1999.
    • (1999)
    • Prodromidis, L.1    Stolfo, S.J.2
  • 19
    • 0003450542 scopus 로고
    • The nature of statistical learning theory
    • Springer
    • V. N. Vladimir, "The Nature of Statistical Learning Theory", Springer, 1995.
    • (1995)
    • Vladimir, V.N.1
  • 20
    • 0006890005 scopus 로고    scopus 로고
    • The development and analysis of intrusion detection algorithms
    • S.M. Thesis, Massachusetts Institute of Technology
    • S. E. Webster, "The Development and Analysis of Intrusion Detection Algorithms", S.M. Thesis, Massachusetts Institute of Technology, 1998.
    • (1998)
    • Webster, S.E.1
  • 21
    • 0242497418 scopus 로고    scopus 로고
    • http://kdd.ics.uci.edu/databases/kddcup99/task.htm.
  • 22
    • 0242414175 scopus 로고    scopus 로고
    • http://www.ll.mit.edu/IST/ideval/data/data_index.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.