메뉴 건너뛰기




Volumn 19, Issue 3, 2007, Pages 345-354

K-Means+ID3: A novel method for supervised anomaly detection by cascading k-Means clustering and ID3 decision tree learning methods

Author keywords

Anomaly detection; Classification; Decision trees; k Means clustering; Receiver operating characteristic (ROC) curves

Indexed keywords

ANOMALY DETECTION; DECISION BOUNDARIES; K-MEANS CLUSTERING METHOD; RECEIVER OPERATING CHARACTERISTIC (ROC) CURVES;

EID: 33847704184     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2007.44     Document Type: Article
Times cited : (189)

References (29)
  • 2
    • 1942436335 scopus 로고    scopus 로고
    • Robustness of the Markov-Chain Model for Cyber-Attack Detection
    • N. Ye, Y. Zhang, and CM. Borror, "Robustness of the Markov-Chain Model for Cyber-Attack Detection," IEEE Trans. Reliability, vol. 53, no. 1, pp. 116-123, 2004.
    • (2004) IEEE Trans. Reliability , vol.53 , Issue.1 , pp. 116-123
    • Ye, N.1    Zhang, Y.2    Borror, C.M.3
  • 5
    • 21744450636 scopus 로고    scopus 로고
    • Symbolic Time Series Analysis for Anomaly Detection: A Comparative Evaluation
    • Sept
    • S.C. Chin, A. Ray, and V. Rajagopalan, "Symbolic Time Series Analysis for Anomaly Detection: A Comparative Evaluation," Signal Processing, vol. 85, no. 9, pp. 1859-1868, Sept. 2005.
    • (2005) Signal Processing , vol.85 , Issue.9 , pp. 1859-1868
    • Chin, S.C.1    Ray, A.2    Rajagopalan, V.3
  • 6
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly Detection in IP Networks
    • M. Thottan and C. Ji, "Anomaly Detection in IP Networks," IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2191-2204, 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 8
    • 0141464248 scopus 로고    scopus 로고
    • HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification
    • June
    • Z. Zhang, J. Li, C.N. Manikopoulos, J. Jorgenson, and J. Ucles, "HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification," Proc. 2001 IEEE Workshop Information Assurance, pp. 85-90, June 2001.
    • (2001) Proc. 2001 IEEE Workshop Information Assurance , pp. 85-90
    • Zhang, Z.1    Li, J.2    Manikopoulos, C.N.3    Jorgenson, J.4    Ucles, J.5
  • 11
    • 2642522033 scopus 로고    scopus 로고
    • Symbolic Dynamic Analysis of Complex Systems for Anomaly Detection
    • A. Ray, "Symbolic Dynamic Analysis of Complex Systems for Anomaly Detection," Signal Processing, vol. 84, no. 7, pp. 1115-1130, 2004.
    • (2004) Signal Processing , vol.84 , Issue.7 , pp. 1115-1130
    • Ray, A.1
  • 12
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
    • N. Ye, S.M. Emran, Q. Chen, and S. Vilbert, "Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection," IEEE Trans. Computers, vol. 51, no. 7, pp. 810-820, 2002.
    • (2002) IEEE Trans. Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 14
    • 1642354876 scopus 로고    scopus 로고
    • KDD-99 Classifier Learning Contest: LLSoft's Results Overview
    • Jan
    • I. Levin, "KDD-99 Classifier Learning Contest: LLSoft's Results Overview," SIGKDD Explorations, vol. 1, pp. 67-75, Jan. 2000.
    • (2000) SIGKDD Explorations , vol.1 , pp. 67-75
    • Levin, I.1
  • 16
    • 0013029835 scopus 로고    scopus 로고
    • PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection)
    • Technical Report DSTO-GD-0286, Dept. of Computer Science, Univ. of Minnesota
    • R. Agarwal and M.V. Joshi, "PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection)," Technical Report DSTO-GD-0286, Dept. of Computer Science, Univ. of Minnesota, 2000.
    • (2000)
    • Agarwal, R.1    Joshi, M.V.2
  • 17
    • 27644496932 scopus 로고    scopus 로고
    • A New Dependency and Correlation Analysis for Features
    • Sept
    • G. Qu, S. Hariri, and M. Yousif, "A New Dependency and Correlation Analysis for Features," IEEE Trans. Knowleddge and Data Eng., vol. 17, no. 9, pp. 1199-1207, Sept. 2005.
    • (2005) IEEE Trans. Knowleddge and Data Eng , vol.17 , Issue.9 , pp. 1199-1207
    • Qu, G.1    Hariri, S.2    Yousif, M.3
  • 20
    • 0036532571 scopus 로고    scopus 로고
    • Switching between Selection and Fusion in Combining Classifiers: An Experiment
    • Apr
    • L.I. Kuncheva, "Switching between Selection and Fusion in Combining Classifiers: An Experiment," IEEE Trans. Systems, Man, and Cybernetics, vol. 32, no. 2, pp. 146-156, Apr. 2002.
    • (2002) IEEE Trans. Systems, Man, and Cybernetics , vol.32 , Issue.2 , pp. 146-156
    • Kuncheva, L.I.1
  • 25
    • 33847743017 scopus 로고    scopus 로고
    • Symbolic Time Series Analysis of Mechanical Systems for Anomaly Detection
    • Aug
    • A.M. Khatkhate, A. Ray, E. Keller, and S. Chin, "Symbolic Time Series Analysis of Mechanical Systems for Anomaly Detection," IEEE/ASME Trans. Mechatronics, vol. 11, no. 4, pp. 439-447, Aug. 2006.
    • (2006) IEEE/ASME Trans. Mechatronics , vol.11 , Issue.4 , pp. 439-447
    • Khatkhate, A.M.1    Ray, A.2    Keller, E.3    Chin, S.4
  • 28
    • 0345438685 scopus 로고    scopus 로고
    • ROC Graphs: Notes and Practical Considerations for Data Mining Researchers
    • Technical Report HPL-2003-4, HP Labs, 2003
    • T. Fawcett, "ROC Graphs: Notes and Practical Considerations for Data Mining Researchers," Technical Report HPL-2003-4, HP Labs, 2003.
    • Fawcett, T.1
  • 29
    • 14644390912 scopus 로고    scopus 로고
    • Using AUC and Accuracy in Evaluating Learning Algorithms
    • Mar
    • J. Huang and C. Ling, "Using AUC and Accuracy in Evaluating Learning Algorithms," IEEE Trans. Knowledge and Data Eng, vol. 17, no. 3, pp. 299-310, Mar. 2005.
    • (2005) IEEE Trans. Knowledge and Data Eng , vol.17 , Issue.3 , pp. 299-310
    • Huang, J.1    Ling, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.