메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 512-515

Intrusion detection system based on new association rule mining model

Author keywords

Association rule; Data mining; Intrusion detection; Network security

Indexed keywords

DATA MINING; INFORMATION TECHNOLOGY; LOGIC PROGRAMMING; MATHEMATICAL MODELS;

EID: 33845348900     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GRC.2005.1547344     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis, USA.
    • R. Bace, "Intrusion Detection," Macmillan Technical Publishing, Indianapolis, USA., 2000.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 2
    • 0038304302 scopus 로고    scopus 로고
    • A conceptual intrusion monitoring architecture and thoughts on practical implementation
    • P. Downland, S. Furnell, "A Conceptual Intrusion Monitoring Architecture and Thoughts on Practical Implementation," in IFEP'00, 2000.
    • (2000) IFEP'00
    • Downland, P.1    Furnell, S.2
  • 3
    • 0027719169 scopus 로고
    • A process approach to information security management
    • WG 11.1, Toronto, Canada
    • R. Von, "A process approach to information security management," in IFIP'93, WG 11.1, Toronto, Canada, 1993.
    • (1993) IFIP'93
    • Von, R.1
  • 4
    • 0042484572 scopus 로고    scopus 로고
    • 2001 CSI/FBI computer crime and security survey
    • R. Power, "2001 CSI/FBI Computer Crime and Security Survey," Computer Security Issues and Trends. Vol. VII, No. 1, pp. 1-20, 2001.
    • (2001) Computer Security Issues and Trends. , vol.7 , Issue.1 , pp. 1-20
    • Power, R.1
  • 8
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • R. Kemmerer, G, Vigna, "Intrusion detection: a brief history and overview," Computer, Vol. 35, Issue 4, pp. 27-30, 2002.
    • (2002) Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.1    Vigna, G.2
  • 15
    • 0038103911 scopus 로고    scopus 로고
    • Utilising fuzzy logic and trend analysis for effective intrusion detection
    • B. Martin, S. Rossouw, "Utilising fuzzy logic and trend analysis for effective intrusion detection," Computers & Security. Vol. 22, No. 5, pp. 423-434, 2003.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 423-434
    • Martin, B.1    Rossouw, S.2
  • 16
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • H. Eugene, Z. Diego, "Intrusion detection using autonomous agents," Computer Networks, Vol. 34, pp. 547-570., 2000.
    • (2000) Computer Networks , vol.34 , pp. 547-570
    • Eugene, H.1    Diego, Z.2
  • 17
    • 0038643297 scopus 로고    scopus 로고
    • A hybrid model for intrusion detection based on temporal probabilistic networks
    • Beijing, China, 20-25 August
    • A. Seleznyov, "A Hybrid Model for Intrusion Detection Based on Temporal Probabilistic Networks", in IFIP'00, Beijing, China, 20-25 August, 2000.
    • (2000) IFIP'00
    • Seleznyov, A.1
  • 18
    • 0037142572 scopus 로고    scopus 로고
    • Anomaly intrusion detection method based on HMM
    • Y. Qiao, X. Xin, Y. Bin, S. Ge, "Anomaly intrusion detection method based on HMM," Electronics Letters. Vol. 38, Issue 13, pp. 663-664, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 663-664
    • Qiao, Y.1    Xin, X.2    Bin, Y.3    Ge, S.4
  • 20
    • 0242468747 scopus 로고    scopus 로고
    • An anomaly intrusion detection method by clustering normal user behavior
    • H. Sang, S. Won, "An anomaly intrusion detection method by clustering normal user behavior," Computers and Security, Vol. 22, No. 7, pp. 596-612, 2003.
    • (2003) Computers and Security , vol.22 , Issue.7 , pp. 596-612
    • Sang, H.1    Won, S.2
  • 21
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D. Yeung, Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern Recognition. Vol. 36, pp. 229-243, 2003.
    • (2003) Pattern Recognition , vol.36 , pp. 229-243
    • Yeung, D.1    Ding, Y.2
  • 22
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion detection
    • W. Chen, S. Hsu, H. Shen, "Application of SVM and ANN for intrusion detection," Computers and Operations Research, Vol. 32, pp. 2617-2634, 2005.
    • (2005) Computers and Operations Research , vol.32 , pp. 2617-2634
    • Chen, W.1    Hsu, S.2    Shen, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.