메뉴 건너뛰기




Volumn , Issue , 2006, Pages 584-589

An adaptive IDS model based on swarm intelligence and support vector machine

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; CELLULAR AUTOMATA; CHLORINE COMPOUNDS; CLUSTERING ALGORITHMS; COMPUTER CRIME; COMPUTER NETWORKS; DECISION SUPPORT SYSTEMS; FLOW OF SOLIDS; FUZZY CLUSTERING; IMAGE RETRIEVAL; INFORMATION MANAGEMENT; INFORMATION TECHNOLOGY; INTERNET; KNOWLEDGE BASED SYSTEMS; LABELING; LEARNING SYSTEMS; OPTIMIZATION; SIGNAL DETECTION; SUPPORT VECTOR MACHINES; TECHNOLOGY; VECTORS;

EID: 50949085026     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCIT.2006.340017     Document Type: Conference Paper
Times cited : (4)

References (33)
  • 2
    • 0033293396 scopus 로고    scopus 로고
    • Towards a Taxonomy of Intrusion Detection Systems, IBM Technical Paper
    • April
    • Herv Debar, Marc Dacier, and Andreas Wespi, "Towards a Taxonomy of Intrusion Detection Systems", IBM Technical Paper, Computer Networks, Vol. 39, Issue 9, pp. 805-822, April 1999.
    • (1999) Computer Networks , vol.39 , Issue.9 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 3
    • 0038223829 scopus 로고    scopus 로고
    • NIST Special Publication on Intrusion Detection System, 31 November
    • R. Bace and P. Mell, "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System, 31 November 2001.
    • (2001) Intrusion Detection Systems
    • Bace, R.1    Mell, P.2
  • 6
    • 0009956176 scopus 로고    scopus 로고
    • Machine Learning techniques for the computer Security
    • PhD thesis, Purdue University
    • T. Lane, "Machine Learning techniques for the computer Security", PhD thesis, Purdue University, 2000.
    • (2000)
    • Lane, T.1
  • 7
    • 34547568079 scopus 로고    scopus 로고
    • A new intrusion detection method based on discriminant analysis
    • May
    • Madori Asaka, Takefumi Onabuta, Tadashi Inoue, Shunji Okazawa, and Shigeki Goto, "A new intrusion detection method based on discriminant analysis", Oakland, pp. 130-143, May 2001.
    • (2001) Oakland , pp. 130-143
    • Asaka, M.1    Onabuta, T.2    Inoue, T.3    Okazawa, S.4    Goto, S.5
  • 11
    • 50949111971 scopus 로고    scopus 로고
    • J. Twycross, Immune Systems, Danger Theory and Intrusion Detection, presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
    • J. Twycross, Immune Systems, "Danger Theory and Intrusion Detection", presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
  • 15
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion, Computers & Operations Research
    • W.H. Chen, S.H. Hsu, and H.P. Shen, "Application of SVM and ANN for intrusion, Computers & Operations Research", ELSEVIER, Vol. 32, No. 10, 2005, pp. 2617-2634.
    • (2005) ELSEVIER , vol.32 , Issue.10 , pp. 2617-2634
    • Chen, W.H.1    Hsu, S.H.2    Shen, H.P.3
  • 18
    • 33744522522 scopus 로고    scopus 로고
    • Intrusion Detection System Based on Multi-class SVM
    • H. Lee, J. Song, D. Park, "Intrusion Detection System Based on Multi-class SVM", RSFDGrC, Vol. 2, 2005, pp. 511-519.
    • (2005) RSFDGrC , vol.2 , pp. 511-519
    • Lee, H.1    Song, J.2    Park, D.3
  • 19
    • 50949086987 scopus 로고    scopus 로고
    • A. Abraham, R. Jain, Soft Computing Models for Network Intrusion Detection Systems CoRRcs, CR/0405046, 2004.
    • A. Abraham, R. Jain, "Soft Computing Models for Network Intrusion Detection Systems CoRRcs", CR/0405046, 2004.
  • 21
    • 50949102776 scopus 로고    scopus 로고
    • B. Schoelkopf, C. Burges, and V. Vapnik., Extracting support data for a given task. In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA, 1995.
    • B. Schoelkopf, C. Burges, and V. Vapnik., "Extracting support data for a given task". In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA, 1995.
  • 22
    • 50949090836 scopus 로고    scopus 로고
    • S. Knerrr, L. Personnaz, and G. Dreyfus, Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network, In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
    • S. Knerrr, L. Personnaz, and G. Dreyfus, "Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network", In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
  • 23
    • 24944586818 scopus 로고    scopus 로고
    • Network-Based Intrusion Detection with Support Vector Machines
    • D. S. Kim, J. S. Park, "Network-Based Intrusion Detection with Support Vector Machines", ICOIN, 2003, pp. 747-756.
    • (2003) ICOIN , pp. 747-756
    • Kim, D.S.1    Park, J.S.2
  • 25
    • 0008568526 scopus 로고    scopus 로고
    • AntClass: Discovery of clusters in numeric data by an hybridization of an ant colony with k-means algorithm
    • Internal Report no. 213, Laboratoire d'Informatique de l'Universite de January
    • Monmarche N., Silmane M., and Venturini G., "AntClass: discovery of clusters in numeric data by an hybridization of an ant colony with k-means algorithm", Internal Report no. 213, Laboratoire d'Informatique de l'Universite de January 1999.
    • (1999)
    • Monmarche, N.1    Silmane, M.2    Venturini, G.3
  • 26
    • 50949096523 scopus 로고    scopus 로고
    • KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
    • (1999)
  • 27
    • 84874124494 scopus 로고    scopus 로고
    • Visualization of anomaly detection using prediction sensitivity
    • April
    • P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, "Visualization of anomaly detection using prediction sensitivity", Proc. of Sicherheit, April 2005, 197-208.
    • (2005) Proc. of Sicherheit , pp. 197-208
    • Laskov, P.1    Rieck, K.2    Schäfer, C.3    Müller, K.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.