메뉴 건너뛰기




Volumn , Issue , 2005, Pages 11-17

An efficient network intrusion detection method based on information theory and genetic algorithm

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK ATTACKS; NETWORK INTRUSION DETECTION METHOD;

EID: 28444485027     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (69)

References (19)
  • 1
    • 0003964874 scopus 로고
    • Next-generation intrusion detection expert system (NIDES): A summary
    • Computer Science Laboratory, SRI International, Menlo Park, California
    • Anderson, D., Frivold, T., and Valdes, A. (1995) "Next-generation intrusion detection expert system (NIDES): A summary". Technical Report SRI-CSL95-07 (May), Computer Science Laboratory, SRI International, Menlo Park, California
    • (1995) Technical Report , vol.SRI-CSL95-07 , Issue.MAY
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 2
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implication for the difficulty of intrusion detection
    • November 1-4, Kent Ridge Digital Labs. Singapore, Copyright ACM 1999
    • th ACM Conference on Computer and Communications security, pp. 1-7, November 1-4, 1999, Kent Ridge Digital Labs. Singapore, Copyright ACM 1999, http://www.ce.chalmers. se/staff/sax/difficulty.pdf.
    • (1999) th ACM Conference on Computer and Communications Security , pp. 1-7
    • Axelsson, S.1
  • 3
    • 0005887591 scopus 로고    scopus 로고
    • Discovering comprehensible classification rules using genetic programming: A case study in a medical domain
    • Morgan Kaufmann
    • C. E. Bojarczuk, H. S. Lopes, and A. A. Freitas, "Discovering comprehensible classification rules using genetic programming: a case study in a medical domain," Proc. Genetic and Evolutionary Computation Conference GECCO99, Morgan Kaufmann, pp. 953-958, 1999.
    • (1999) Proc. Genetic and Evolutionary Computation Conference GECCO99 , pp. 953-958
    • Bojarczuk, C.E.1    Lopes, H.S.2    Freitas, A.A.3
  • 8
    • 84948667727 scopus 로고    scopus 로고
    • Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection
    • Fuzzy Information Proceeding Society, June
    • J. Gomez, D. Dasgupta, O. Nasraoui, and onzalez. F, "Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection," in Fuzzy Information Proceeding Society, Proceedings. NAFIPS 2003 Annual Meeting of the North American, pp. 27-29, June 2002.
    • (2002) Proceedings. NAFIPS 2003 Annual Meeting of the North American , pp. 27-29
    • Gomez, J.1    Dasgupta, D.2    Nasraoui, O.3    Onzalez, F.4
  • 9
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Ilgun, K., Kemmerer, R.A., Porras, P.A. (1995) "State Transition Analysis: A rule-based intrusion detection approach." IEEE Transactions on Software Engineering 21, 3(March), 181-199
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 MARCH , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 11
    • 0003871635 scopus 로고
    • PhD Dissertation. Dept. of Computer and Communication Sciences, Univ. of Michigan, Ann Arbor. January
    • K.D. Jong "An Analysis of Behavior of a Class of Genetic Adaptive Systems". PhD Dissertation. Dept. of Computer and Communication Sciences, Univ. of Michigan, Ann Arbor. January, 1975
    • (1975) An Analysis of Behavior of a Class of Genetic Adaptive Systems
    • Jong, K.D.1
  • 12
    • 84861289471 scopus 로고    scopus 로고
    • HTTP://kdd.ics.uci.edu/databases/kddcup99/task.html.
  • 14
    • 0003451777 scopus 로고    scopus 로고
    • A real-time intrusion detection expert system (IDES) -final technical report
    • Computer Science Laboratory, SRI International, Menlo Park, California
    • T. Lunt, et al. "A real-time intrusion detection expert system (IDES) -final technical report. Technical report (February), Computer Science Laboratory, SRI International, Menlo Park, California
    • Technical Report , Issue.FEBRUARY
    • Lunt, T.1
  • 16
    • 0027660339 scopus 로고
    • An evaluation of local improvement operators for genetic algorithms
    • Sept/Oct.
    • J. A. Miller, et al. " An evaluation of local improvement operators for genetic algorithms," IEEE Trans. Syst., Man, Cybern., vol. 23, pp 1340-1351, Sept/Oct. 1993.
    • (1993) IEEE Trans. Syst., Man, Cybern. , vol.23 , pp. 1340-1351
    • Miller, J.A.1
  • 17
    • 0024631471 scopus 로고
    • A connectionist model for diagnostic problem solving
    • Mar./Apr.
    • Y. Peng and J. A. Reggia, " A connectionist model for diagnostic problem solving,", IEEE Trans. Syst., Man, Cvbern., vol 19, pp. 285-298. Mar./Apr. 1989.
    • (1989) IEEE Trans. Syst., Man, Cvbern. , vol.19 , pp. 285-298
    • Peng, Y.1    Reggia, J.A.2
  • 18
    • 0347606556 scopus 로고    scopus 로고
    • Winning the KDD99 classification cup: Bagged boosting
    • Pfahringer B. "Winning the KDD99 Classification Cup: Bagged Boosting". SIGKDD Explorations. ACM SIGKDD. 1(2) (2000) 65-66.
    • (2000) SIGKDD Explorations. ACM SIGKDD. , vol.1 , Issue.2 , pp. 65-66
    • Pfahringer, B.1
  • 19
    • 28444457022 scopus 로고    scopus 로고
    • INBOUNDS: The integrated network-based Ohio university network detective service
    • Orlando, Florida, USA, July 23-26
    • B. Tjaden, et al, "INBOUNDS: The Integrated Network-Based Ohio University Network Detective Service", in the Proceedings of SCI 2000 and ISAS 2000, Orlando, Florida, USA, July 23-26 2000.
    • (2000) The Proceedings of SCI 2000 and ISAS 2000
    • Tjaden, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.