메뉴 건너뛰기




Volumn 177, Issue 15, 2007, Pages 3060-3073

Network intrusion detection: Evaluating cluster, discriminant, and logit analysis

Author keywords

Cluster analysis; Discriminant analysis; Intrusion detection; Logit analysis KDD 99

Indexed keywords

CLUSTER ANALYSIS; DATABASE SYSTEMS; DISCRIMINANT ANALYSIS; INFORMATION USE; MATRIX ALGEBRA; RANDOM VARIABLES;

EID: 34248169333     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.02.034     Document Type: Article
Times cited : (37)

References (35)
  • 1
    • 34248179145 scopus 로고    scopus 로고
    • ACM KDD CUP Center, .
  • 3
    • 1642354476 scopus 로고    scopus 로고
    • Sage Publications, Thousand Oaks, CA
    • Borooah V.K. Logit and probit (2002), Sage Publications, Thousand Oaks, CA
    • (2002) Logit and probit
    • Borooah, V.K.1
  • 4
    • 0032142103 scopus 로고    scopus 로고
    • Query construction for user-guided knowledge discovery in databases
    • Chen Z., and Zhu Q. Query construction for user-guided knowledge discovery in databases. Information Sciences 109 1-4 (1998) 49-64
    • (1998) Information Sciences , vol.109 , Issue.1-4 , pp. 49-64
    • Chen, Z.1    Zhu, Q.2
  • 5
    • 34248231366 scopus 로고    scopus 로고
    • D. Dagon, X. Oin, G. Gu, and W. Lee, HoneyStat: Local worm detection using honeypots. Georgia Institute of Technology, 2005.
  • 7
    • 34248173041 scopus 로고    scopus 로고
    • Discriminant Function Analysis. .
  • 10
    • 0030953391 scopus 로고    scopus 로고
    • A review of methods for the assessment of prediction errors in conservation presence/absence models
    • Fielding A.H., and Bell J.F. A review of methods for the assessment of prediction errors in conservation presence/absence models. Environmental Conservation 24 (1997) 38-49
    • (1997) Environmental Conservation , vol.24 , pp. 38-49
    • Fielding, A.H.1    Bell, J.F.2
  • 11
    • 33750972001 scopus 로고    scopus 로고
    • Anomaly detection in web documents using crisp and fuzzy-based cosine clusteringnext term methodology
    • Friedman M., Last M., Makover Y., and Kandel A. Anomaly detection in web documents using crisp and fuzzy-based cosine clusteringnext term methodology. Information Sciences 177 2 (2007) 467-475
    • (2007) Information Sciences , vol.177 , Issue.2 , pp. 467-475
    • Friedman, M.1    Last, M.2    Makover, Y.3    Kandel, A.4
  • 13
    • 0033101994 scopus 로고    scopus 로고
    • Logical second order models: Achieving synergy between computer power and human reason
    • Gim G., and Whalen T. Logical second order models: Achieving synergy between computer power and human reason. Information Sciences 114 1-4 (1999) 81-104
    • (1999) Information Sciences , vol.114 , Issue.1-4 , pp. 81-104
    • Gim, G.1    Whalen, T.2
  • 15
    • 0002331476 scopus 로고
    • On the formulation of empirical models in dynamic econometrics
    • Hendry D., and Richard J. On the formulation of empirical models in dynamic econometrics. Journal of Econometrics 20 (1982) 193-220
    • (1982) Journal of Econometrics , vol.20 , pp. 193-220
    • Hendry, D.1    Richard, J.2
  • 16
    • 34248225458 scopus 로고    scopus 로고
    • D. Hendry, Econometric methodology, Econometric Society Fifth World Congress MIT 1985.
  • 17
    • 3242738586 scopus 로고    scopus 로고
    • Recent advances in access control models
    • Olivier M.S., and Spooner D.L. (Eds), Kluwer Academic Publishers, Boston
    • Jajodia S., and Wijesekera D. Recent advances in access control models. In: Olivier M.S., and Spooner D.L. (Eds). Database and Application Security XV (2002), Kluwer Academic Publishers, Boston 3-15
    • (2002) Database and Application Security XV , pp. 3-15
    • Jajodia, S.1    Wijesekera, D.2
  • 19
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 9 (2003) 443-471
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.9 , pp. 443-471
    • Julisch, K.1
  • 20
    • 34248148176 scopus 로고    scopus 로고
    • KDD Cup 1999 Data, 1999, University of California, Irvine, .
  • 22
    • 0004200962 scopus 로고
    • Sage Publications, Thousand Oaks, CA
    • Klecka W. Discriminant Analysis (1980), Sage Publications, Thousand Oaks, CA
    • (1980) Discriminant Analysis
    • Klecka, W.1
  • 23
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Kolter J., and Maloof M. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7 (2006) 2721-2744
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Kolter, J.1    Maloof, M.2
  • 25
    • 0017360990 scopus 로고
    • The measurement of observer agreement for categorical data
    • Landis J.R., and Koch G. The measurement of observer agreement for categorical data. Biometrics 33 (1977) 159-174
    • (1977) Biometrics , vol.33 , pp. 159-174
    • Landis, J.R.1    Koch, G.2
  • 26
    • 84874124494 scopus 로고    scopus 로고
    • P. Laskov, K. Rieck, C. Schfer, K. Mller, Visualization of anomaly detection using prediction sensitivity. In Sicherheit 2005 (Sicherheit - Schutz und Zuverlssigkeit), 2. Jahrestagung des FB Sicherheit der GI, 2005, pp. 197-208.
  • 27
    • 33748205931 scopus 로고    scopus 로고
    • Genetically optimized fuzzy polynomial neural networks with fuzzy set-based polynomial neurons
    • Oh S., Pedrycz W., and Roh S. Genetically optimized fuzzy polynomial neural networks with fuzzy set-based polynomial neurons. Information Sciences 176 23 (2006) 3490-3519
    • (2006) Information Sciences , vol.176 , Issue.23 , pp. 3490-3519
    • Oh, S.1    Pedrycz, W.2    Roh, S.3
  • 28
    • 13544276813 scopus 로고    scopus 로고
    • A database clustering methodology and tool
    • Ryu T.W., and Eick C. A database clustering methodology and tool. Information Sciences 171 1-3 (2005) 29-59
    • (2005) Information Sciences , vol.171 , Issue.1-3 , pp. 29-59
    • Ryu, T.W.1    Eick, C.2
  • 29
    • 0041189144 scopus 로고
    • An evaluation of the corporate takeover model using neural networks. Intelligent Systems in Accounting
    • Sen T., and Gibbs A. An evaluation of the corporate takeover model using neural networks. Intelligent Systems in Accounting. Finance and Management 3 4 (1994) 279-292
    • (1994) Finance and Management , vol.3 , Issue.4 , pp. 279-292
    • Sen, T.1    Gibbs, A.2
  • 32
    • 34248167719 scopus 로고    scopus 로고
    • A. Sundaram, An introduction to intrusion detection, 1996, .
  • 33


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.