메뉴 건너뛰기




Volumn 27, Issue 4, 2006, Pages 232-245

Indirect classification approaches: A comparative study in network intrusion detection

Author keywords

Binary classifiers; Hamming decoding; Indirect combining techniques; Loss based decoding; Multi group classifications; Network intrusion detection systems; Soft max function

Indexed keywords

CLASSIFICATION (OF INFORMATION); CLASSIFIERS; DATA MINING; DECODING; LEARNING SYSTEMS; PROBLEM SOLVING;

EID: 33847145889     PISSN: 09528091     EISSN: None     Source Type: Journal    
DOI: 10.1504/IJCAT.2006.011995     Document Type: Article
Times cited : (2)

References (37)
  • 1
    • 33847142898 scopus 로고    scopus 로고
    • Agarwal, R. and Joshi, M.V. (2000) PNrule: A New Framework for Learning Classifier Models in Data Mining, Technical TR 00-015, Department of Computer Science, University of Minnesota, Minneapolis, MN 55455.
    • Agarwal, R. and Joshi, M.V. (2000) PNrule: A New Framework for Learning Classifier Models in Data Mining, Technical TR 00-015, Department of Computer Science, University of Minnesota, Minneapolis, MN 55455.
  • 2
    • 24044435942 scopus 로고    scopus 로고
    • Reducing multiclass to binary: A unifying approach for margin classifiers
    • December
    • Allwein, E.L., Schapire, R.E. and Singer, Y. (2000) 'Reducing multiclass to binary: a unifying approach for margin classifiers', Journal of Machine Learning Research, December, Vol. 1, pp.113-141.
    • (2000) Journal of Machine Learning Research , vol.1 , pp. 113-141
    • Allwein, E.L.1    Schapire, R.E.2    Singer, Y.3
  • 4
    • 69549123046 scopus 로고
    • Errorcorrecting output codes: A general method for improving multiclass inductive learning programs
    • Dean, T.L. and McKeown, K, Eds, AAAI Press, Menlo Park, CA, pp
    • Dietterich, T.G. and Bakiri, G. (1991) 'Errorcorrecting output codes: a general method for improving multiclass inductive learning programs', in Dean, T.L. and McKeown, K. (Eds.): Proceedings of the Ninth AAAI National Conference on Artificial Intelligence, AAAI Press, Menlo Park, CA, pp.572-577.
    • (1991) Proceedings of the Ninth AAAI National Conference on Artificial Intelligence , pp. 572-577
    • Dietterich, T.G.1    Bakiri, G.2
  • 5
    • 0000406788 scopus 로고
    • Solving multiclass learning problems via error-correcting output codes
    • Dietterich, T.G. and Bakiri, G. (1995) 'Solving multiclass learning problems via error-correcting output codes', Journal of Artificial Intelligence Research, Vol. 2, pp. 263-286.
    • (1995) Journal of Artificial Intelligence Research , vol.2 , pp. 263-286
    • Dietterich, T.G.1    Bakiri, G.2
  • 6
    • 35248866563 scopus 로고    scopus 로고
    • Duan, K., Keerthi, S.S. and Chu, W. (2003) 'Multi-category classification by soft-max combination of binary classifiers'. In Multiple Classifier Systems, Lecture Notes in Computer Science. 11-13 June. Springer, Guilford, UK, 2709. pp. 125-134.
    • Duan, K., Keerthi, S.S. and Chu, W. (2003) 'Multi-category classification by soft-max combination of binary classifiers'. In Multiple Classifier Systems, Lecture Notes in Computer Science. 11-13 June. Springer, Guilford, UK, Vol. 2709. pp. 125-134.
  • 11
    • 33847172911 scopus 로고    scopus 로고
    • Geleyn, E. (2002) Combining Decision Trees for Software Quality Classification: An Empirical Study, Master's thesis. Advised by Khoshgoftaar, T.M., May, Florida Atlantic University. Boca Raton. FL. USA.
    • Geleyn, E. (2002) Combining Decision Trees for Software Quality Classification: An Empirical Study, Master's thesis. Advised by Khoshgoftaar, T.M., May, Florida Atlantic University. Boca Raton. FL. USA.
  • 12
    • 33847124158 scopus 로고    scopus 로고
    • Gomez, J. and Dasgupta, D. (2001) 'Evolving fuzzy classifiers for intrusion detection'. In Proceedings of the 2002 IEEE. Workshop on Information Assurance. June. United States Military Academy, West Point, NY.
    • Gomez, J. and Dasgupta, D. (2001) 'Evolving fuzzy classifiers for intrusion detection'. In Proceedings of the 2002 IEEE. Workshop on Information Assurance. June. United States Military Academy, West Point, NY.
  • 13
    • 84948667727 scopus 로고    scopus 로고
    • Gomez, J., Dasgupta, D., Nasaroui, O. and Gonzalez, F. (2002) 'Complete expressions trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection', In proceedings of the North American Fiery Information Processing Society, June, pp.63-78.
    • Gomez, J., Dasgupta, D., Nasaroui, O. and Gonzalez, F. (2002) 'Complete expressions trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection', In proceedings of the North American Fiery Information Processing Society, June, pp.63-78.
  • 17
    • 0034197704 scopus 로고    scopus 로고
    • A practical classificationrule for software quality models
    • June
    • Khoshgoftaar, T.M. and Allen, E.B. (2000) 'A practical classificationrule for software quality models'. IEEE Transactions on Reliability, June, Vol. 49, No. 2, pp.209-216.
    • (2000) IEEE Transactions on Reliability , vol.49 , Issue.2 , pp. 209-216
    • Khoshgoftaar, T.M.1    Allen, E.B.2
  • 18
    • 0036891333 scopus 로고    scopus 로고
    • Using regression trees to classify fault-prone software modules
    • December
    • Khoshgoftaar, T.M., Allen, E.B. and Deng, J. (2002) 'Using regression trees to classify fault-prone software modules'. IEEE Transactions on Reliability, December. Vol. 51, No. 4, pp.455-462.
    • (2002) IEEE Transactions on Reliability , vol.51 , Issue.4 , pp. 455-462
    • Khoshgoftaar, T.M.1    Allen, E.B.2    Deng, J.3
  • 19
    • 33847125017 scopus 로고    scopus 로고
    • Khoshgoftaar, T.M., Gao, K. and Wang, Y. (2004) 'A comparative study of classification algorithms for network intrusion detection', in Pham. H. and Yamada, S. (Eds,): Proceedings of the 10th International Conference on Reliability and Quality in Design. 5-7 August. International Society of Science and Applied Technologies, Las Vegas, Nevada. USA. pp.168-172.
    • Khoshgoftaar, T.M., Gao, K. and Wang, Y. (2004) 'A comparative study of classification algorithms for network intrusion detection', in Pham. H. and Yamada, S. (Eds,): Proceedings of the 10th International Conference on Reliability and Quality in Design. 5-7 August. International Society of Science and Applied Technologies, Las Vegas, Nevada. USA. pp.168-172.
  • 20
    • 85009255613 scopus 로고    scopus 로고
    • Combined binary classifiers with applications to speech recognition
    • 16-20 September. Denver. Colorado. USA, pp
    • Klautau, A., Jevtic, N. and Orlitsky, A. (2002) 'Combined binary classifiers with applications to speech recognition'. In Seventh International Conference on Spoken Language Processing. 16-20 September. Denver. Colorado. USA, pp.2469-2472.
    • (2002) Seventh International Conference on Spoken Language Processing , pp. 2469-2472
    • Klautau, A.1    Jevtic, N.2    Orlitsky, A.3
  • 23
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Lee, W., Fan, W., Miller, M., Stolfo, S. and Zadok, E. (2002) 'Toward cost-sensitive modeling for intrusion detection and response'. Journal of Computer Security. Vol. 10, Nos. 1-2, pp.5-22.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 24
    • 33847141583 scopus 로고    scopus 로고
    • Lin, H. (2004) Techniques for Combining Binary Classifiers: A Comparative Study in Network Intrusion Detection Systems. Master's Thesis, May. Advised by Khoshgoftaar, T.M., Florida Atlantic University, Boca Raton, FL. USA.
    • Lin, H. (2004) Techniques for Combining Binary Classifiers: A Comparative Study in Network Intrusion Detection Systems. Master's Thesis, May. Advised by Khoshgoftaar, T.M., Florida Atlantic University, Boca Raton, FL. USA.
  • 25
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production based expert system toolset (p-best)
    • May. Oakland. IEEE Computer Society Press. Los Alamitos. California, pp
    • Lindqvist, U. and Porras, P. (1999) 'Detecting computer and network misuse through the production based expert system toolset (p-best)'. Proceedings of the 1999 IEEE Symposium on Security and Privacy. May. Oakland. IEEE Computer Society Press. Los Alamitos. California, pp.146-161.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.2
  • 27
    • 24744463914 scopus 로고    scopus 로고
    • Using Key-String Selection and Neural Networks to Reduce False Alarms and Detect New Attacks with Sniffer-Based Intrusion Detection Systems
    • West Lafayette, September, Indiana, pp
    • Lippmann, R.P. and Cunningham, R.K. (1999) Using Key-String Selection and Neural Networks to Reduce False Alarms and Detect New Attacks with Sniffer-Based Intrusion Detection Systems, in RAID 1999 Conference. West Lafayette, September, Indiana, pp.7-9.
    • (1999) RAID 1999 Conference , pp. 7-9
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 28
    • 84867071286 scopus 로고    scopus 로고
    • Masulli, F. and Alentini, G. (2000) 'Effectiveness of error correcting output coding methods in ensemble, In Multiple Classifier Systems, Lecture Notes in Computer Science. 21-23 June, Springer, Cagliari, Italy, 1857, pp.107-116.
    • Masulli, F. and Alentini, G. (2000) 'Effectiveness of error correcting output coding methods in ensemble", In Multiple Classifier Systems, Lecture Notes in Computer Science. 21-23 June, Springer, Cagliari, Italy, Vol. 1857, pp.107-116.
  • 29
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • November, pp
    • McHugh, J. (2000) 'Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory'. ACM Transactions on Information and System Security, Vol. 3, No. 4. November, pp.262-294.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 30
    • 33847151850 scopus 로고    scopus 로고
    • Performance based feature identification for intrusion detection using support vector machines
    • Santiago. Chile. 01-04 December, pp
    • Mukkamala, S. and Sung, A.M. (2002) 'Performance based feature identification for intrusion detection using support vector machines'. The Second International Conference on Hybrid Intelligent Systems. Santiago. Chile. 01-04 December, pp.351-364
    • (2002) The Second International Conference on Hybrid Intelligent Systems , pp. 351-364
    • Mukkamala, S.1    Sung, A.M.2
  • 31
    • 0347606556 scopus 로고    scopus 로고
    • Winning the kdd99 classification cup: Bagged boosting
    • Pfahringer, B. (2000) 'Winning the kdd99 classification cup: bagged boosting'. ACM SIGKDD Explorations Newsletter, Vol. 1, No. 2, pp.65, 66.
    • (2000) ACM SIGKDD Explorations Newsletter , vol.1 , Issue.2
    • Pfahringer, B.1
  • 32
    • 33847137889 scopus 로고    scopus 로고
    • Portnoy, L., Eskin, E. and Stolfo, S.J. (2001) 'Intrusion detection with unlabeled data using clustering', In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA- 2001), 5-8 November, Philadelphia, PA. pp.51-62.
    • Portnoy, L., Eskin, E. and Stolfo, S.J. (2001) 'Intrusion detection with unlabeled data using clustering', In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA- 2001), 5-8 November, Philadelphia, PA. pp.51-62.
  • 33
    • 0023417432 scopus 로고
    • Simplifying decision trees'. International Journal of Man-Machine Studies, Special Issue
    • December
    • Quinlan, R.J. (1987) 'Simplifying decision trees'. International Journal of Man-Machine Studies, Special Issue: Knowledge Acquisition for Knowledge-based Systems. Part 5. December, Vol. 27, No. 3, pp.221-234.
    • (1987) Knowledge Acquisition for Knowledge-based Systems. Part 5 , vol.27 , Issue.3 , pp. 221-234
    • Quinlan, R.J.1
  • 34
    • 0000383868 scopus 로고
    • Parallel networks that learn to pronounce English text
    • Sejnowski, T.J. and Rosenberg, C.R. (1987) 'Parallel networks that learn to pronounce English text', Journal of Complex Systems, Vol. 1, pp. 145-168.
    • (1987) Journal of Complex Systems , vol.1 , pp. 145-168
    • Sejnowski, T.J.1    Rosenberg, C.R.2
  • 36
    • 84962238645 scopus 로고    scopus 로고
    • Cost-based modeling for fraud and intrusion detection: Results from the JAM project
    • 25th-27th January, Hilton Head, South Carolina
    • Stolfo, S.J., Fan, W. and Lee, W. (2000) 'Cost-based modeling for fraud and intrusion detection: results from the JAM project', Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 25th-27th January, Hilton Head, South Carolina, Vol. 2, pp.1130-1144.
    • (2000) Proceedings of the 2000 DARPA Information Survivability Conference and Exposition , vol.2 , pp. 1130-1144
    • Stolfo, S.J.1    Fan, W.2    Lee, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.