메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 100-107

Applying data mining of fuzzy association rules to network intrusion detection

Author keywords

Data mining; Fuzzy logic; Intrusion detection

Indexed keywords

DATA SETS; KUOK'S ALGORITHMS; NETWORK INTRUSION DETECTION; NETWORK TRAFFIC;

EID: 33845947480     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (51)

References (21)
  • 1
    • 0021474230 scopus 로고
    • Making computers think like people
    • August
    • L. A. Zadeh, "Making computers think like people," in IEEE Spectrum, p. 26, August 1984.
    • (1984) IEEE Spectrum , pp. 26
    • Zadeh, L.A.1
  • 2
    • 0023999614 scopus 로고
    • L. A. Zadeh, "Fuzzy logic," vol. 21, no. 4, pp. 83-93, 1988.
    • (1988) Fuzzy logic , vol.21 , Issue.4 , pp. 83-93
    • Zadeh, L.A.1
  • 3
    • 71549167720 scopus 로고
    • Security is fuzzy! applying the fuzzy logic paradigm to the multipolicy paradigm
    • Little Compton, Rhode Island, pp, August
    • H. A. Hosmer, "Security is fuzzy! applying the fuzzy logic paradigm to the multipolicy paradigm," in 1992-93 Workshop on New Secuity Paradigms, (Little Compton, Rhode Island), pp. 175-184, August 1993.
    • (1993) 1992-93 Workshop on New Secuity Paradigms , pp. 175-184
    • Hosmer, H.A.1
  • 8
    • 0034247240 scopus 로고    scopus 로고
    • Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    • John Wiley & Sons
    • J. Luo and S. Bridges, "Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection," in International Journal of Intelligent Systems, pp. 687-703, John Wiley & Sons, 2000.
    • (2000) International Journal of Intelligent Systems , pp. 687-703
    • Luo, J.1    Bridges, S.2
  • 14
    • 85006425144 scopus 로고
    • Fuzzy sets and secure computer systems
    • Little Compton, Rhode Island, pp
    • S. Ovchinnikov, "Fuzzy sets and secure computer systems," in Workshop on New Security Paradigms, (Little Compton, Rhode Island), pp. 54-62, 1994.
    • (1994) Workshop on New Security Paradigms , pp. 54-62
    • Ovchinnikov, S.1
  • 15
    • 85012240666 scopus 로고    scopus 로고
    • Data mining-based intrusion detectors: An overview of the columbia ids project
    • S. J. Stolfo, W. Lee, P. K. Chan, W. Fan, and E. Eskin, "Data mining-based intrusion detectors: An overview of the columbia ids project," vol. 30, no. 4, pp. 5-14, 2001.
    • (2001) , vol.30 , Issue.4 , pp. 5-14
    • Stolfo, S.J.1    Lee, W.2    Chan, P.K.3    Fan, W.4    Eskin, E.5
  • 21
    • 33845961221 scopus 로고    scopus 로고
    • L. Laboratory, Lincoln laboratory data sets, in Massachusetts Institute of Technology, (http://www.ll.mit.edu/IST/ideval/ data/1999).
    • L. Laboratory, "Lincoln laboratory data sets," in Massachusetts Institute of Technology, (http://www.ll.mit.edu/IST/ideval/ data/1999).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.