메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 1563-1568

Feature selection for intrusion detection: An evolutionary wrapper approach

Author keywords

[No Author keywords available]

Indexed keywords

DATA REDUCTION; EVOLUTIONARY ALGORITHMS; INTERNET; LEARNING ALGORITHMS; MULTILAYER NEURAL NETWORKS; OPTIMIZATION; RADIAL BASIS FUNCTION NETWORKS;

EID: 10944257572     PISSN: 10987576     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (25)
  • 1
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Department of Computer Engineering, Chalmers University of Technology, Göteborg
    • S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Department of Computer Engineering, Chalmers University of Technology, Göteborg," Tech. Rep. 99-15, 2000.
    • (2000) Tech. Rep. , vol.99 , Issue.15
    • Axelsson, S.1
  • 5
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • R. P. Lippmann and R. K. Cunningham, "Improving intrusion detection performance using keyword selection and neural networks," Computer Networks, vol. 34, no. 4, pp. 597-603, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 597-603
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 6
    • 0036082885 scopus 로고    scopus 로고
    • A comparison of input representations in neural networks: A case study in intrusion detection
    • Honolulu
    • Z. Liu, G. Florez, and S. M. Bridges, "A comparison of input representations in neural networks: a case study in intrusion detection," in Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002), Honolulu, vol. 2, 2002, pp. 1708-1713.
    • (2002) Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002) , vol.2 , pp. 1708-1713
    • Liu, Z.1    Florez, G.2    Bridges, S.M.3
  • 10
    • 34848894054 scopus 로고    scopus 로고
    • The application of fuzzy ARTMAP in the detection of computer network attacks
    • Vienna, ser. LNCS 2130, G. Dorffner, H. Bischof, and K. Hornik, Eds. Springer-Verlag, Berlin, Heidelberg, New York
    • J. Cannady and R. C. Garcia, "The application of fuzzy ARTMAP in the detection of computer network attacks," in Artificial Neural Networks -ICANN 2001 (Proc. of the 11th Int. Conf. on Artificial Neural Networks), Vienna, ser. LNCS 2130, G. Dorffner, H. Bischof, and K. Hornik, Eds. Springer-Verlag, Berlin, Heidelberg, New York, 2001, pp. 225-230.
    • (2001) Artificial Neural Networks -ICANN 2001 (Proc. of the 11th Int. Conf. on Artificial Neural Networks) , pp. 225-230
    • Cannady, J.1    Garcia, R.C.2
  • 17
    • 85036529638 scopus 로고    scopus 로고
    • Intrusion detection applying machine learning to Solaris audit data
    • Scottsdale, AZ: IEEE Computer Society Press
    • D. Endler, "Intrusion detection applying machine learning to Solaris audit data," in Proc. of the 1998 Annual Computer Security Applications Conference (ACSAC'98). Scottsdale, AZ: IEEE Computer Society Press, 1998, pp. 268-279.
    • (1998) Proc. of the 1998 Annual Computer Security Applications Conference (ACSAC'98) , pp. 268-279
    • Endler, D.1
  • 18
    • 0003200953 scopus 로고
    • Artificial intelligence and intrusion detection: Current and future directions
    • Baltimore, MD
    • J. Frank, "Artificial intelligence and intrusion detection: Current and future directions," in Proceedings of the 17th National Computer Security Conference, Baltimore, MD, 1994.
    • (1994) Proceedings of the 17th National Computer Security Conference
    • Frank, J.1
  • 19
    • 84943383590 scopus 로고    scopus 로고
    • Identifying important features for intrusion detection using support vector machines and neural networks
    • Orlando, Florida: IEEE Computer Society
    • S. Mukkamala and A. H. Sung, "Identifying important features for intrusion detection using support vector machines and neural networks," in 2003 Symposium on Applications and the Internet. Orlando, Florida: IEEE Computer Society, 2003, pp. 209-216.
    • (2003) 2003 Symposium on Applications and the Internet , pp. 209-216
    • Mukkamala, S.1    Sung, A.H.2
  • 20
    • 0037083574 scopus 로고    scopus 로고
    • Automated discovery of concise predictive rules for intrusion detection
    • G. Helmer, J. S. K. Wong, V. Honavar, and L. Miller, "Automated discovery of concise predictive rules for intrusion detection," The Journal of Systems and Software, vol. 60, no. 3, pp. 165-175, 2002.
    • (2002) The Journal of Systems and Software , vol.60 , Issue.3 , pp. 165-175
    • Helmer, G.1    Wong, J.S.K.2    Honavar, V.3    Miller, L.4
  • 25
    • 0003428414 scopus 로고    scopus 로고
    • 1st ed. Addison Wesley Longman
    • W. R. Stevens, TCP/IP Illustrated, Volume 1, 1st ed. Addison Wesley Longman, 1998.
    • (1998) TCP/IP Illustrated , vol.1
    • Stevens, W.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.