메뉴 건너뛰기




Volumn , Issue , 2008, Pages 245-247

A study on the feature selection of network traffic for intrusion detection purpose

Author keywords

Clustering methods; Feature extraction; Intrusion detection

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; CLUSTER ANALYSIS; CLUSTERING ALGORITHMS; COMPUTER CRIME; DATA MINING; DECISION SUPPORT SYSTEMS; FEATURE EXTRACTION; FINANCIAL DATA PROCESSING; FLOW OF SOLIDS; FUZZY CLUSTERING; INFORMATION MANAGEMENT; INTERNET; INTERSYMBOL INTERFERENCE; MINING; SEARCH ENGINES; SENSORS;

EID: 51849135423     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISI.2008.4565069     Document Type: Conference Paper
Times cited : (16)

References (11)
  • 2
    • 51849159397 scopus 로고    scopus 로고
    • McHugh, J. The 1998 Lincoln Laboratory IDS Evaluation (A Critique). in Recent Advances in Intrusion Detection 2000 (RAID 2000). 2000. Toulouse, France: Springer.
    • McHugh, J. The 1998 Lincoln Laboratory IDS Evaluation (A Critique). in Recent Advances in Intrusion Detection 2000 (RAID 2000). 2000. Toulouse, France: Springer.
  • 4
    • 51849137203 scopus 로고    scopus 로고
    • ACM. KDD CUP 1999 data. [cited 12 January 2007]; Available from: http://kdd.ics.uci.edU//databases/kddcup99/kddcup99.html.
    • ACM. KDD CUP 1999 data. [cited 12 January 2007]; Available from: http://kdd.ics.uci.edU//databases/kddcup99/kddcup99.html.
  • 5
    • 0242456133 scopus 로고    scopus 로고
    • An Empirical Analysis of NATE: Network Analysis of Anomalous Traffic Events
    • Virginia Beach, Virginia, USA: ACM Press
    • Taylor, C. and J. Alves-Foss. An Empirical Analysis of NATE: Network Analysis of Anomalous Traffic Events. in 10th New Security Paradigms Workshop. 2002. Virginia Beach, Virginia, USA: ACM Press.
    • (2002) 10th New Security Paradigms Workshop
    • Taylor, C.1    Alves-Foss, J.2
  • 6
    • 0242456143 scopus 로고    scopus 로고
    • NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach
    • Cloudcroft, New Mexico, USA
    • Taylor, C. and J. Alves-Foss. NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach. in Proceedings of New Security Paradigms Workshop. 2001. Cloudcroft, New Mexico, USA.
    • (2001) Proceedings of New Security Paradigms Workshop
    • Taylor, C.1    Alves-Foss, J.2
  • 7
    • 0003993827 scopus 로고    scopus 로고
    • cited 2006 15 October 2006, Available from
    • DARPA. DARPA Intrusion Detection Evaluation Data Sets. 1999 [cited 2006 15 October 2006]; Available from: http://www.ll.mit.edu/IST/ideval/data/ data_index.html.
    • (1999) DARPA Intrusion Detection Evaluation Data Sets
  • 8
    • 51849145518 scopus 로고    scopus 로고
    • Li, X. and N. Ye. Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. in Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics. 2004. Tucson, AZ, USA: Springer-Verlag.
    • Li, X. and N. Ye. Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. in Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics. 2004. Tucson, AZ, USA: Springer-Verlag.
  • 11
    • 0000924888 scopus 로고    scopus 로고
    • Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection: Results from the JAM Project
    • Stolfo, S.J., W. Fan, et al. Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection: Results from the JAM Project, in Proceedings of 2000 DARPA Information Survivability Conference and Exposition. 2000.
    • (2000) Proceedings of 2000 DARPA Information Survivability Conference and Exposition
    • Stolfo, S.J.1    Fan, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.