메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1117-1121

Ad hoc-based feature selection and support vector machine classifier for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; ADMINISTRATIVE DATA PROCESSING; CLASSIFICATION (OF INFORMATION); CLASSIFIERS; DATA MINING; DECISION SUPPORT SYSTEMS; FEATURE EXTRACTION; IMAGE RETRIEVAL; INFORMATION MANAGEMENT; INTELLIGENT SYSTEMS; LEARNING SYSTEMS; MINING; MULTILAYER NEURAL NETWORKS; OPTIMIZATION; SEARCH ENGINES; SUPPORT VECTOR MACHINES; SYSTEM THEORY; VECTORS;

EID: 50249084525     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GSIS.2007.4443446     Document Type: Conference Paper
Times cited : (21)

References (21)
  • 2
    • 34247391599 scopus 로고    scopus 로고
    • System Approach to Intrusion Detection Using Hidden Markov Model
    • July 3-6, Vancouver, British Columbia, Canada, pp
    • Rahul Khanna, Huaping Liu. System Approach to Intrusion Detection Using Hidden Markov Model, IWCMC'06, July 3-6, 2006, Vancouver, British Columbia, Canada, pp.349-354.
    • (2006) IWCMC'06 , pp. 349-354
    • Khanna, R.1    Liu, H.2
  • 4
    • 38049121550 scopus 로고    scopus 로고
    • Witcha Chimphlee, Mohd Noor Md Sap, Abdul Hanan Abdullah, Siriporn Chimphlee, and Surat Srinoy. To Identify Suspicious Activity in Anomaly Detection Based on Soft Computing, Proceedings of the 24th IASTED International Mutli-Conference ARTIFIVAL INTELLIGENCE AND APPLICATIONS, February,13-16,2006, Innsbruck, Austria, pp. 359-364.
    • Witcha Chimphlee, Mohd Noor Md Sap, Abdul Hanan Abdullah, Siriporn Chimphlee, and Surat Srinoy. To Identify Suspicious Activity in Anomaly Detection Based on Soft Computing, Proceedings of the 24th IASTED International Mutli-Conference ARTIFIVAL INTELLIGENCE AND APPLICATIONS, February,13-16,2006, Innsbruck, Austria, pp. 359-364.
  • 5
    • 33847406678 scopus 로고    scopus 로고
    • A hierarchical intrusion detection model based on the PCA neural networks
    • Guisong Liu, Zhang Yi, Shangming Yang. A hierarchical intrusion detection model based on the PCA neural networks, Neurocomputing, 70 (2007), pp. 1561-1568.
    • (2007) Neurocomputing , vol.70 , pp. 1561-1568
    • Liu, G.1    Yi, Z.2    Yang, S.3
  • 7
    • 0036613003 scopus 로고    scopus 로고
    • An Artificial Immune System Architecture for Computer Security Applications
    • June
    • P.K. Karmer, P.D. Williams, and G.H. Gunsch, et al. An Artificial Immune System Architecture for Computer Security Applications. IEEE Transactions on Evolutionary Computation, Vol.6, No.3, pp.252-280, June, 2002.
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 252-280
    • Karmer, P.K.1    Williams, P.D.2    Gunsch, G.H.3
  • 8
    • 1642355954 scopus 로고    scopus 로고
    • Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context[C]. Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications
    • June, Las Vegas, Nevada, USA, pp
    • Maheshkumar Sabhnani, Gürsel Serpen. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context[C]. Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications. MLMTA'03, June, 2003, Las Vegas, Nevada, USA, pp.209-215.
    • (2003) MLMTA'03 , pp. 209-215
    • Sabhnani, M.1    Serpen, G.2
  • 9
    • 33847156085 scopus 로고    scopus 로고
    • PNrule: A new Framework for Learning Classifier Models in Data Mining( A Case-Study in Network Intrusion Detection) [A]
    • Chicago, USA
    • Agarwal, M. V. Joshi. PNrule: A new Framework for Learning Classifier Models in Data Mining( A Case-Study in Network Intrusion Detection) [A]. Proceedings of the First SIAM Conference on Data Mining [C]. Chicago, USA, 2001.
    • (2001) Proceedings of the First SIAM Conference on Data Mining , vol.100
    • Agarwal, M.V.J.1
  • 11
    • 24944586818 scopus 로고    scopus 로고
    • Dong Seong Kim, Jong Sou Park. Network-based Intrusion Detection with Support Vector Machines. ICOIN 2003, New York: Springer, 2003, pp.747-756.
    • Dong Seong Kim, Jong Sou Park. Network-based Intrusion Detection with Support Vector Machines. ICOIN 2003, New York: Springer, 2003, pp.747-756.
  • 16
    • 12344273544 scopus 로고    scopus 로고
    • Object detection using feature subset selection
    • Sun, Z., Bebis, G., & Miller, R.. Object detection using feature subset selection. Pattern Recognition, 27, 2004, pp. 2165-2176.
    • (2004) Pattern Recognition , vol.27 , pp. 2165-2176
    • Sun, Z.1    Bebis, G.2    Miller, R.3
  • 17
    • 0001001098 scopus 로고    scopus 로고
    • Feature selection for SVMs
    • Weston, J., Mukherjee, S., Chapelle, O., et al. Feature selection for SVMs NIPS 12, 2000, pp. 668-674.
    • (2000) NIPS , vol.12 , pp. 668-674
    • Weston, J.1    Mukherjee, S.2    Chapelle, O.3
  • 18
    • 50249091608 scopus 로고    scopus 로고
    • KDD cup 99 data set, hhttp://kdd.ics.uci.edu/database/kddcup99/i.
    • KDD cup 99 data set, hhttp://kdd.ics.uci.edu/database/kddcup99/i.
  • 20
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion detection
    • Wun-Hua Chen, Sheng-Hsun Hsu and Hwang-Pin Shen. Application of SVM and ANN for intrusion detection. Computer & Operation Research 32 (2005), pp.2617-2634.
    • (2005) Computer & Operation Research , vol.32 , pp. 2617-2634
    • Chen, W.-H.1    Hsu, S.-H.2    Shen, H.-P.3
  • 21
    • 84940104123 scopus 로고    scopus 로고
    • W.Lee, S. Stolfo and K. Mok. A data mining framework for building intrusion detection models. Proceedings of the 1999 IEEE Symposium on Security and Privacy', pp.120-132.
    • W.Lee, S. Stolfo and K. Mok. A data mining framework for building intrusion detection models. Proceedings of the 1999 IEEE Symposium on Security and Privacy', pp.120-132.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.