메뉴 건너뛰기




Volumn 4571 LNAI, Issue , 2007, Pages 404-418

A comparative study of unsupervised machine learning and data mining techniques for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DISTRIBUTION FUNCTIONS; ENGINEERING RESEARCH; HEURISTIC ALGORITHMS; UNSUPERVISED LEARNING;

EID: 37249023319     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73499-4_31     Document Type: Conference Paper
Times cited : (20)

References (26)
  • 1
    • 37249021738 scopus 로고    scopus 로고
    • Available at
    • Available at http://kdd.ics.uci.edU//databases/kddcup99/kddcup99.html
  • 4
    • 0039253819 scopus 로고    scopus 로고
    • LOF: Identifying density-based local outliers
    • Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. SIGMOD Rec. 29(2), 93-104 (2000)
    • (2000) SIGMOD Rec , vol.29 , Issue.2 , pp. 93-104
    • Breunig, M.M.1    Kriegel, H.P.2    Ng, R.T.3    Sander, J.4
  • 7
    • 37249058214 scopus 로고    scopus 로고
    • Chang, C.-C., Lin, C-J.: LIBSVM: a library for support vector machines (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
    • Chang, C.-C., Lin, C-J.: LIBSVM: a library for support vector machines (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
  • 8
    • 0002629270 scopus 로고
    • Maximum likelihood from incomplete data via the em algorithm
    • Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. J. Royal Stat. Soc. 39, 1-38 (1977)
    • (1977) J. Royal Stat. Soc , vol.39 , pp. 1-38
    • Dempster, A.P.1    Laird, N.M.2    Rubin, D.B.3
  • 9
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222-232 (1987)
    • (1987) IEEE Trans. Softw. Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 10
    • 0015644825 scopus 로고
    • A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters
    • Dunn, J.C.: A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters. Journal of Cybernatics 3, 32-57 (1974)
    • (1974) Journal of Cybernatics , vol.3 , pp. 32-57
    • Dunn, J.C.1
  • 17
    • 4544251643 scopus 로고    scopus 로고
    • Lei, J.Z., Ghorbani, A.: Network intrusion detection using an improved competitive learning neural network. In: CNSR, pp. 190-197 (2004)
    • Lei, J.Z., Ghorbani, A.: Network intrusion detection using an improved competitive learning neural network. In: CNSR, pp. 190-197 (2004)
  • 18
    • 0001457509 scopus 로고
    • Some methods for classification and analysis of multivariate observations
    • MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: 5th Berkley Symposium on Math and Probability, pp. 281-297 (1967)
    • (1967) 5th Berkley Symposium on Math and Probability , pp. 281-297
    • MacQueen, J.1
  • 20
    • 35248842651 scopus 로고    scopus 로고
    • Ramadas, M., Ostermann, S., Tjaden, B.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, Springer, Heidelberg (2003)
    • Ramadas, M., Ostermann, S., Tjaden, B.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, Springer, Heidelberg (2003)
  • 25
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • Ye, N., Emran, S.M., Chen, Q., Vilbert, S.: Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 51(7), 810-820 (2002)
    • (2002) IEEE Trans. Comput , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.