메뉴 건너뛰기




Volumn , Issue , 2007, Pages 186-192

Intrusion detection model based on particle swarm optimization and support vector machine

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); INFORMATION TECHNOLOGY; NETWORK SECURITY; PROBLEM SOLVING; SUPPORT VECTOR MACHINES; TELECOMMUNICATION TRAFFIC;

EID: 34548793095     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISDA.2007.368152     Document Type: Conference Paper
Times cited : (53)

References (35)
  • 2
    • 0033293396 scopus 로고    scopus 로고
    • Towards a Taxonomy of Intrusion Detection Systems, IBM Technical Paper
    • April
    • Herv Debar, Maro Dacier, and Andreas Wespi, "Towards a Taxonomy of Intrusion Detection Systems", IBM Technical Paper, Computer Networks, Vol.39, Issue 9, pp. 805-822, April 1999.
    • (1999) Computer Networks , vol.39 , Issue.9 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 3
    • 0038223829 scopus 로고    scopus 로고
    • NIST Special Publication on Intrusion Detection System, 31 November
    • R. Bace and P. Mell, "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System, 31 November 2001.
    • (2001) Intrusion Detection Systems
    • Bace, R.1    Mell, P.2
  • 6
    • 0009956176 scopus 로고    scopus 로고
    • Machine Learning techniques for the computer Security
    • PhD thesis, Purdue University
    • T.Lane, "Machine Learning techniques for the computer Security", PhD thesis, Purdue University, 2000.
    • (2000)
    • Lane, T.1
  • 7
    • 34547568079 scopus 로고    scopus 로고
    • A new intrusion detection method, based on discriminant analysis
    • May
    • Madori Asaka, Takefumi Onabuta, Tadashi Inoue, Shunji Okazawa, and Shigeki Goto, "A new intrusion detection method, based on discriminant analysis", Oakland, pp. 130-143, May 2001.
    • (2001) Oakland , pp. 130-143
    • Asaka, M.1    Onabuta, T.2    Inoue, T.3    Okazawa, S.4    Goto, S.5
  • 8
    • 6344223434 scopus 로고    scopus 로고
    • Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks
    • Learning and Cybernetics IEEE Computer Society, Shanghai, China, August 26-29
    • Ming Tang, Song-Can Chen, Yi Zhuang and Jia Liu, "Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks", Proc. Of the Third International Conference on Machine, Learning and Cybernetics IEEE Computer Society, Shanghai, China, August 26-29, 2004.
    • (2004) Proc. Of the Third International Conference on Machine
    • Tang, M.1    Chen, S.2    Zhuang, Y.3    Liu, J.4
  • 9
    • 0033636139 scopus 로고    scopus 로고
    • Support vector machine classification and validation of cancer tissue samples using microarray expression data
    • Furey, T.S., Cristianini, N., Duffy, N., Beddarski, K.W., Schummer, M. and Haussler, "Support vector machine classification and validation of cancer tissue samples using microarray expression data," Bioinformatics, vol. 16, pp.906-914, 2000.
    • (2000) Bioinformatics , vol.16 , pp. 906-914
    • Furey, T.S.1    Cristianini, N.2    Duffy, N.3    Beddarski, K.W.4    Schummer, M.5    Haussler6
  • 10
    • 0036161259 scopus 로고    scopus 로고
    • Gene selection for cancer classification using support vector machines
    • Guyon, I., Weston, J., Barnhill, S. and Vapnik, V., "Gene selection for cancer classification using support vector machines," Machine Learning, Vol. 46, pp.389-422, 2002.
    • (2002) Machine Learning , vol.46 , pp. 389-422
    • Guyon, I.1    Weston, J.2    Barnhill, S.3    Vapnik, V.4
  • 11
    • 0038729565 scopus 로고    scopus 로고
    • Classification of multiple cancer types be multicategory support vector machines using gene expression data
    • Lee, Y. and Lee, C.-K., "Classification of multiple cancer types be multicategory support vector machines using gene expression data," Bioinformatics, vol. 18, pp. 1132-1139, 2003.
    • (2003) Bioinformatics , vol.18 , pp. 1132-1139
    • Lee, Y.1    Lee, C.-K.2
  • 14
    • 34548766983 scopus 로고    scopus 로고
    • J. Twycross, Immune Systems, Danger Theory and Intrusion Detection, presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
    • J. Twycross, Immune Systems, "Danger Theory and Intrusion Detection", presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
  • 18
    • 0000629975 scopus 로고
    • Cross-Validation choice and assessment of statistical predictions
    • Stone, M., "Cross-Validation choice and assessment of statistical predictions," Journal of the Royal Statistical Society B, vol 36, pp. 111-147, 1974.
    • (1974) Journal of the Royal Statistical Society B , vol.36 , pp. 111-147
    • Stone, M.1
  • 19
    • 0031352450 scopus 로고    scopus 로고
    • Kennedy, J., Eberhart, R.C., A discrete binary Version of the particle swarm algorithm, Systems, Man, and Cyemetics, 1997. 'Computational Cybernetics and Simulation]., 1997 IEEE international Conference on 5, 12-15 Oct. 1997. pp.4104-4108.
    • Kennedy, J., Eberhart, R.C., "A discrete binary Version of the particle swarm algorithm", Systems, Man, and Cyemetics, 1997. 'Computational Cybernetics and Simulation]., 1997 IEEE international Conference on Volume 5, 12-15 Oct. 1997. pp.4104-4108.
  • 21
    • 84899013173 scopus 로고    scopus 로고
    • Support Vector regression Machines,
    • Moser, M, Jordan, M, and Petshe, T, ed, MIT Press, Cambridge, Ma, pp
    • Drucker, H., Burges, C., Kaufman, L., Smola, A. and Vapnik, "Support Vector regression Machines, " in Moser, M., Jordan, M., and Petshe, T. (ed.) Neural Information Processing Systems, Vol. 9. MIT Press, Cambridge, Ma, pp. 155-161. 1997.
    • (1997) Neural Information Processing Systems , vol.9 , pp. 155-161
    • Drucker, H.1    Burges, C.2    Kaufman, L.3    Smola, A.4    Vapnik5
  • 23
    • 0000759079 scopus 로고
    • The Adatron-an adaptive perceptron algorihm
    • Anlauf, J.K., and Biehl, M., "The Adatron-an adaptive perceptron algorihm," Europhysics letters, 10, pp., 687-692. 1989.
    • (1989) Europhysics letters , vol.10 , pp. 687-692
    • Anlauf, J.K.1    Biehl, M.2
  • 24
    • 0011891024 scopus 로고
    • Learning Time of Neural Networks; Exact Solution for a Perceptron Algorithm
    • Opper, M., "Learning Time of Neural Networks; Exact Solution for a Perceptron Algorithm," physical review A38:3824. 1988.
    • (1988) physical review , vol.A38 , pp. 3824
    • Opper, M.1
  • 28
    • 34548711176 scopus 로고    scopus 로고
    • KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
    • (1999)
    • data set, K.D.D.1
  • 29
    • 84874124494 scopus 로고    scopus 로고
    • Visualization of anomaly detection, using prediction sensitivity
    • April
    • P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, "Visualization of anomaly detection, using prediction sensitivity". Proc. of Sicherheit, April.2005, 197-208.
    • (2005) Proc. of Sicherheit , pp. 197-208
    • Laskov, P.1    Rieck, K.2    Schäfer, C.3    Müller, K.R.4
  • 31
    • 0003425664 scopus 로고    scopus 로고
    • Support Vector Machines for Classification and Regression
    • Technical report
    • Steven R. Gunn, "Support Vector Machines for Classification and Regression," Technical report, 1998.
    • (1998)
    • Gunn, S.R.1
  • 32
    • 34247187961 scopus 로고    scopus 로고
    • Proc. Int. Conf. on ICT-Mercu Buana ICT2005
    • W. Chimphlee, Abdul Hanan Abdullah, Mohd Noor Md Sap and S. Chimphlee, "Unsupervised Anomaly Detection, with Unlabeled Data Using Clustering", Proc. Int. Conf. on ICT-Mercu Buana ICT2005. 42-49.
    • Chimphlee, W.1    Hanan Abdullah, A.2    Noor, M.3    Sap, M.4    Chimphlee, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.