메뉴 건너뛰기




Volumn 6241, Issue , 2006, Pages

Attribute selection using information gain for a fuzzy logic intrusion detection system

Author keywords

Attribute selection; Data mining; Decision trees; Fuzzy logic; Intrusion detection

Indexed keywords

ATTRIBUTE SELECTION; DECISION TREES; INFORMATION GAIN; INTRUSION DETECTION;

EID: 33747333910     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.666611     Document Type: Conference Paper
Times cited : (3)

References (21)
  • 4
    • 26844574201 scopus 로고    scopus 로고
    • Applying data mining to intrusion detection: The quest for automation, efficiency and credibility
    • W. Lee, "Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency and Credibility." ACM SIGKDD Explorations Newsletter, Vol. 4, Issue 2, pp.35-45, 2002.
    • (2002) ACM SIGKDD Explorations Newsletter , vol.4 , Issue.2 , pp. 35-45
    • Lee, W.1
  • 5
    • 0004255908 scopus 로고    scopus 로고
    • Machine learning
    • Boston, MA
    • T. Mitchell, "Machine Learning". WCB McGraw-Hill, Boston, MA, 1997.
    • (1997) WCB McGraw-hill
    • Mitchell, T.1
  • 6
    • 71549167720 scopus 로고
    • Security is fuzzy! Applying the fuzzy logic paradigm to the multipolicy paradigm
    • Little Compton, RI
    • H. Hosmer, "Security is Fuzzy! Applying the Fuzzy Logic Paradigm to the Multipolicy Paradigm." Proceedings of the 1992-1003 workshop on New Security Paradigms, Little Compton, RI, pp. 175-184, 1993.
    • (1993) Proceedings of the 1992-1003 Workshop on New Security Paradigms , pp. 175-184
    • Hosmer, H.1
  • 9
    • 0348132918 scopus 로고    scopus 로고
    • Mining fuzzy association rules in databases
    • C. Kuok, A. Fu, and M. Wong, "Mining Fuzzy Association Rules in Databases" The ACM SIGMOD Record, Vol. 27, No. 1, pp. 41-46. 1998.
    • (1998) The ACM SIGMOD Record , vol.27 , Issue.1 , pp. 41-46
    • Kuok, C.1    Fu, A.2    Wong, M.3
  • 12
    • 0034247240 scopus 로고    scopus 로고
    • Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    • John Wiley & Sons
    • J. Luo, and S. Bridges. "Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection." International Journal of Intelligent Systems, John Wiley & Sons, Vol. 15, pp. 687-703, 2000.
    • (2000) International Journal of Intelligent Systems , vol.15 , pp. 687-703
    • Luo, J.1    Bridges, S.2
  • 14
    • 84973632308 scopus 로고    scopus 로고
    • Fuzzy reasoning in jess: The fuzzy J toolkit and FuzzyJess
    • Proceedings of the ICEIS 2001, Setubal, Portugal
    • R. Orchard. "Fuzzy Reasoning in Jess: The Fuzzy J Toolkit and FuzzyJess." Proceedings of the ICEIS 2001, 3rd International Conference on Enterprise Information Systems, Setubal, Portugal, pp. 533-542, 2001.
    • (2001) 3rd International Conference on Enterprise Information Systems , pp. 533-542
    • Orchard, R.1
  • 15
    • 0032028297 scopus 로고    scopus 로고
    • Feature subset selection using a genetic algorithm
    • J. Yang, and V. Honavar, "Feature Subset Selection Using a Genetic Algorithm." IEEE Intelligent Systems, Vol. 13, No. 2, pp. 44-49, 1998.
    • (1998) IEEE Intelligent Systems , vol.13 , Issue.2 , pp. 44-49
    • Yang, J.1    Honavar, V.2
  • 18
    • 33751119481 scopus 로고    scopus 로고
    • Hybrid feature selection for modeling intrusion detection systems
    • Pal N.R. et al. (Eds.) Springer Verlag, Germany, Lecture Notes in Computer Science
    • S. Chebrolu, A. Abraham, and J. Thomas, "Hybrid Feature Selection for Modeling Intrusion Detection Systems". 11th International Conference on Neural Information Processing, ICONIP'04, Pal N.R. et al. (Eds.) Springer Verlag, Germany, Lecture Notes in Computer Science, Vol. 3316, pp. 1020-1025, 2004.
    • (2004) 11th International Conference on Neural Information Processing, ICONIP'04 , vol.3316 , pp. 1020-1025
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.