메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 352-367

A study on classification techniques for network intrusion detection

Author keywords

Artificial neural networks; K means classifier; Network intrusion detection; Support vector machines

Indexed keywords

COMPUTER SYSTEMS; INTRUSION DETECTION; NETWORK SECURITY; NEURAL NETWORKS; SUPPORT VECTOR MACHINES;

EID: 34047165837     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (15)
  • 1
    • 34047184261 scopus 로고    scopus 로고
    • Symantec internet security threat report highlights rise in threats to confidential information (symantec.com), Accessed: 2005, May 10. Available: http://www.prdomain.com/companies/s/symantec/newsreleases/200503mar/ symantec_internet_20050321.htm.
    • "Symantec internet security threat report highlights rise in threats to confidential information (symantec.com)," Accessed: 2005, May 10. Available: http://www.prdomain.com/companies/s/symantec/newsreleases/200503mar/ symantec_internet_20050321.htm.
  • 2
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," Commun. ACM, vol. 42, no. 7, pp. 53-61, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 3
    • 84943383590 scopus 로고    scopus 로고
    • Identifying important features for intrusion detection using support vector machines and neural networks
    • A. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in Symposium on Applications and the Internet, pp. 209-216, 2003.
    • (2003) Symposium on Applications and the Internet , pp. 209-216
    • Sung, A.1    Mukkamala, S.2
  • 4
    • 34047109692 scopus 로고    scopus 로고
    • A tutorial on clustering algorithms, Accessed: 2004, October 1. Available: http://www.elet.polimi.it/upload/matteucc/Clustering/ tutorial_html/kmeans.html.
    • "A tutorial on clustering algorithms," Accessed: 2004, October 1. Available: http://www.elet.polimi.it/upload/matteucc/Clustering/ tutorial_html/kmeans.html.
  • 5
    • 34047152812 scopus 로고    scopus 로고
    • S. Kaplantzis, Classification techniques for network intrusion detection, 4th year thesis project, Monash University, 2004.
    • S. Kaplantzis, "Classification techniques for network intrusion detection," 4th year thesis project, Monash University, 2004.
  • 6
    • 0004235910 scopus 로고    scopus 로고
    • Grassroots series (Palgrave Firm, Basingstoke: Palgrave, 2nd ed
    • P. Picton, Neural networks. Grassroots series (Palgrave (Firm)), Basingstoke: Palgrave, 2nd ed., 2000.
    • (2000) Neural networks
    • Picton, P.1
  • 9
    • 34047176426 scopus 로고    scopus 로고
    • Accessed: 2004, September 21. Available
    • D. Lai, "Welcome to daniel lai," Accessed: 2004, September 21. Available: http://www-personal.monash.edu.au/~dlai.
    • Welcome to daniel lai
    • Lai, D.1
  • 10
    • 34047176936 scopus 로고    scopus 로고
    • Darpa intrusion detection evaluation mit lin-coln laboratory, Accessed: 2004, October 1. Available
    • "Darpa intrusion detection evaluation (mit lin-coln laboratory)," Accessed: 2004, October 1. Available:http://www.11.mit.edu/ IST/ideval/.
  • 11
    • 17144386187 scopus 로고    scopus 로고
    • Efficient and robust classification method using combined feature vector for lane detection
    • P. Jeong and S. Nedevschi, "Efficient and robust classification method using combined feature vector for lane detection," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 15, no. 4, pp. 528-537, 2005.
    • (2005) Circuits and Systems for Video Technology, IEEE Transactions on , vol.15 , Issue.4 , pp. 528-537
    • Jeong, P.1    Nedevschi, S.2
  • 12
    • 84943421730 scopus 로고    scopus 로고
    • On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
    • W. Allen and G. Marin, "On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems," in Symposium on Applications and the Internet, pp. 242-248, 2003.
    • (2003) Symposium on Applications and the Internet , pp. 242-248
    • Allen, W.1    Marin, G.2
  • 14
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: a statistical anomaly approach," Communications Magazine, IEEE, vol. 40, no. 10, pp. 76-82, 2002.
    • (2002) Communications Magazine, IEEE , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.