메뉴 건너뛰기




Volumn 70, Issue 7-9, 2007, Pages 1561-1568

A hierarchical intrusion detection model based on the PCA neural networks

Author keywords

Hierarchical detection model; Intrusion detection; Neural networks; Principal component analysis

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER SIMULATION; HIERARCHICAL SYSTEMS; INTRUSION DETECTION; PRINCIPAL COMPONENT ANALYSIS;

EID: 33847406678     PISSN: 09252312     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.neucom.2006.10.146     Document Type: Article
Times cited : (137)

References (25)
  • 1
    • 33847391845 scopus 로고    scopus 로고
    • J.P. Anderson, Computer security threat monitoring and surveillance, Technical Report, James P. Anderson Co., Fort Washington, PA, April 1980.
  • 2
    • 33847382208 scopus 로고    scopus 로고
    • D. Anderson, T. Frivold, A. Valdes, Next-generation intrusion detection expert system (NIDES): a summary, SRI-CSL-95-07, May 1995.
  • 3
    • 15944375471 scopus 로고    scopus 로고
    • Intrusion detection using hierarchical neural networks
    • Chunlin Z., Ju J., and Mohamed K. Intrusion detection using hierarchical neural networks. Pattern Recognition Lett. 26 6 (2005) 779-791
    • (2005) Pattern Recognition Lett. , vol.26 , Issue.6 , pp. 779-791
    • Chunlin, Z.1    Ju, J.2    Mohamed, K.3
  • 5
    • 0025474239 scopus 로고
    • Tracking a few extreme singular values and vectors in signal processing
    • Comon P., and Golub G.H. Tracking a few extreme singular values and vectors in signal processing. Proceedings of the IEEE 78 8 (1990) 1327-1343
    • (1990) Proceedings of the IEEE , vol.78 , Issue.8 , pp. 1327-1343
    • Comon, P.1    Golub, G.H.2
  • 9
    • 33847417320 scopus 로고    scopus 로고
    • KDD Cup Data, 〈http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,〉 March 2006.
  • 12
    • 33745907909 scopus 로고    scopus 로고
    • Detecting and visualizing denial-of-service and network probe attacks using principal component analysis
    • La Londe, France
    • Labib K., and Vemuri V.R. Detecting and visualizing denial-of-service and network probe attacks using principal component analysis. Third Conference on Security and Network Architectures. La Londe, France (June 2004)
    • (2004) Third Conference on Security and Network Architectures
    • Labib, K.1    Vemuri, V.R.2
  • 14
    • 0035402096 scopus 로고    scopus 로고
    • Training a neural-network based intrusion detector to recognize novel attacks
    • Lee S.C., and Heinbuch D.V. Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans. System, Man Cybern., Part A 31 4 (2005) 294-299
    • (2005) IEEE Trans. System, Man Cybern., Part A , vol.31 , Issue.4 , pp. 294-299
    • Lee, S.C.1    Heinbuch, D.V.2
  • 15
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W., and Stolfo S. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Security 3 4 (2000) 227-261
    • (2000) ACM Trans. Inform. Syst. Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 16
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Lippmann R., Haines J., Fried D., Korba J., and Das K. The 1999 DARPA off-line intrusion detection evaluation. Comput. Networks 34 4 (2000) 579-595
    • (2000) Comput. Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3    Korba, J.4    Das, K.5
  • 17
    • 33745894620 scopus 로고    scopus 로고
    • Intrusion Detection Using PCASOM Neural Networks
    • Springer, Berlin, Heidelberg
    • Liu G., and Yi Z. Intrusion Detection Using PCASOM Neural Networks. Proceedings of ISNN2006, Lecture Notes in Computer Science vol. 3973 (2006), Springer, Berlin, Heidelberg 240-245
    • (2006) Proceedings of ISNN2006, Lecture Notes in Computer Science , vol.3973 , pp. 240-245
    • Liu, G.1    Yi, Z.2
  • 18
    • 0026954958 scopus 로고
    • Principal components, minor components, and linear neural networks
    • Oja E. Principal components, minor components, and linear neural networks. Neural Networks 5 6 (1992) 927-935
    • (1992) Neural Networks , vol.5 , Issue.6 , pp. 927-935
    • Oja, E.1
  • 21
    • 27144518261 scopus 로고    scopus 로고
    • A Novel Anomaly Detection Scheme Based on Principal Component Classifier
    • Shyu M., Chen S., Sarinnapakorn K., and Chang L. A Novel Anomaly Detection Scheme Based on Principal Component Classifier. Proceedings of ICDM'03 (2003) 172-179
    • (2003) Proceedings of ICDM'03 , pp. 172-179
    • Shyu, M.1    Chen, S.2    Sarinnapakorn, K.3    Chang, L.4
  • 22
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion detection
    • Wun-Hua C., Sheng-Hsun H., and Hwang-Pin S. Application of SVM and ANN for intrusion detection. Comput. Oper. Res. 32 10 (2005) 2617-2634
    • (2005) Comput. Oper. Res. , vol.32 , Issue.10 , pp. 2617-2634
    • Wun-Hua, C.1    Sheng-Hsun, H.2    Hwang-Pin, S.3
  • 24
    • 28244467214 scopus 로고    scopus 로고
    • A scientific approach to cyberattack detection
    • Ye N., and Farley T. A scientific approach to cyberattack detection. Computer 38 11 (2005) 55-61
    • (2005) Computer , vol.38 , Issue.11 , pp. 55-61
    • Ye, N.1    Farley, T.2
  • 25
    • 33745925265 scopus 로고    scopus 로고
    • An attack-norm separation approach for detecting cyber attacks
    • Ye N., Farley T., and Lakshminarasimhan D. An attack-norm separation approach for detecting cyber attacks. Inform. Syst. Frontiers 8 3 (2006) 163-177
    • (2006) Inform. Syst. Frontiers , vol.8 , Issue.3 , pp. 163-177
    • Ye, N.1    Farley, T.2    Lakshminarasimhan, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.