메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 497-502

Intelligent intrusion detection system

Author keywords

Fuzzy classifiers; Fuzzy rules generation; Intrusion detection systems; Misuse detection

Indexed keywords

COMPUTER NETWORKS; DECISION MAKING; FUZZY CONTROL; FUZZY SETS; SECURITY OF DATA; SECURITY SYSTEMS; SOCIETIES AND INSTITUTIONS;

EID: 10044246138     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 2
    • 0036588773 scopus 로고    scopus 로고
    • Incorporating soft computing techniques into a probabilistic intrusion detection system
    • May
    • S.B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. Systems, Man, and Cybernetics - Part C, vol. 32, pp. 154-160, May 2002.
    • (2002) IEEE Trans. Systems, Man, and Cybernetics - Part C , vol.32 , pp. 154-160
    • Cho, S.B.1
  • 5
  • 6
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • T. Verwoerd, and R. Hunt, "Intrusion detection techniques and approaches," Computer Communications, vol. 25, pp. 1356-1365, 2002.
    • (2002) Computer Communications , vol.25 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 7
    • 0037411435 scopus 로고    scopus 로고
    • The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
    • D. Joo, T. Hong and I. Han, "The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors," Expert Systems with Applications, vol. 25, pp. 69-75, 2003.
    • (2003) Expert Systems with Applications , vol.25 , pp. 69-75
    • Joo, D.1    Hong, T.2    Han, I.3
  • 8
    • 0034300797 scopus 로고    scopus 로고
    • Anomaly-based intrusion detection: Privacy concerns and other problems
    • E. Lundin, and E. Jonsson, "Anomaly-based intrusion detection: privacy concerns and other problems," Computer Networks, vol. 34, pp. 623-640, 2000.
    • (2000) Computer Networks , vol.34 , pp. 623-640
    • Lundin, E.1    Jonsson, E.2
  • 9
    • 0035879674 scopus 로고    scopus 로고
    • Intrusion detection through learning behavior model
    • B. Balajinath, and S.V. Raghavan, "Intrusion detection through learning behavior model," Computer Communications, vol. 24, pp. 1202-1212, 2001.
    • (2001) Computer Communications , vol.24 , pp. 1202-1212
    • Balajinath, B.1    Raghavan, S.V.2
  • 10
    • 10044285459 scopus 로고
    • Security is fuzzy! Applying the fuzzy logic paradigm to the multipolicy paradigm
    • Aug.
    • H.H. Hosmer, "Security is fuzzy! Applying the fuzzy logic paradigm to the multipolicy paradigm," Proceedings ACM Symposium on New Security Paradigms, pp.44-49, Aug. 1993.
    • (1993) Proceedings ACM Symposium on New Security Paradigms , pp. 44-49
    • Hosmer, H.H.1
  • 16
    • 33644961664 scopus 로고    scopus 로고
    • DARPA intrusion detection evaluation: Design and procedures
    • MIT Lincoln Laboratory, 7999 Feb.
    • MIT Lincoln Laboratory, 7999 DARPA intrusion detection evaluation: design and procedures, DARPA Technical Report 1062, Feb. 2001.
    • (2001) DARPA Technical Report , vol.1062
  • 18
    • 0029242750 scopus 로고
    • A method for fuzzy rules extraction directly from numerical data and its application to pattern classification
    • Jan.
    • Sh. Abe and M. Lan, "A method for fuzzy rules extraction directly from numerical data and its application to pattern classification," IEEE Transaction on Fuzzy Systems, vol. 3, pp.18-28, Jan. 1995.
    • (1995) IEEE Transaction on Fuzzy Systems , vol.3 , pp. 18-28
    • Abe, Sh.1    Lan, M.2
  • 21
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S.J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Transactions on Information and System Security, vol. 3, pp. 227-261, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.