메뉴 건너뛰기




Volumn , Issue , 2007, Pages 89-95

Intelligence system approach for computer network security

Author keywords

Intrusion detection system; Particle swarm optimization; Support vector machine

Indexed keywords

COMMUNICATION; COMMUNICATION SYSTEMS; COMPUTATIONAL METHODS; COMPUTER CRIME; COMPUTER SYSTEMS; FUNCTION EVALUATION; IMAGE RETRIEVAL; INTERNET; INTRUSION DETECTION; LEARNING SYSTEMS; MULTILAYER NEURAL NETWORKS; NETWORK PROTOCOLS; NETWORK SECURITY; OPTIMIZATION; PARTICLE SWARM OPTIMIZATION (PSO); SECURITY OF DATA; SENSOR NETWORKS; SIGNAL DETECTION; SUPPORT VECTOR MACHINES; VECTORS;

EID: 54949155505     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (38)
  • 2
    • 0033293396 scopus 로고    scopus 로고
    • Towards a Taxonomy of Intrusion Detection Systems, IBM Technical Paper
    • April
    • Herv Debar, Marc Dacier, and Andreas Wespi, "Towards a Taxonomy of Intrusion Detection Systems", IBM Technical Paper, Computer Networks, Vol.39, Issue 9, pp. 805-822, April 1999.
    • (1999) Computer Networks , vol.39 , Issue.9 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 3
    • 0038223829 scopus 로고    scopus 로고
    • NIST Special Publication on Intrusion Detection System, 31 November
    • R. Bace and P. Mell, "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System, 31 November 2001.
    • (2001) Intrusion Detection Systems
    • Bace, R.1    Mell, P.2
  • 6
    • 0009956176 scopus 로고    scopus 로고
    • Machine Learning techniques for the computer Security
    • PhD thesis, Purdue University
    • T.Lane, "Machine Learning techniques for the computer Security", PhD thesis, Purdue University, 2000.
    • (2000)
    • Lane, T.1
  • 7
    • 34547568079 scopus 로고    scopus 로고
    • A new intrusion detection method based on discriminant analysis
    • May
    • Madori Asaka, Takefumi Onabuta, Tadashi Inoue, Shunji Okazawa, and Shigeki Goto, "A new intrusion detection method based on discriminant analysis", Oakland, pp.130-143, May 2001.
    • (2001) Oakland , pp. 130-143
    • Asaka, M.1    Onabuta, T.2    Inoue, T.3    Okazawa, S.4    Goto, S.5
  • 9
    • 0033636139 scopus 로고    scopus 로고
    • Support vector machine classification and validation of cancer tissue samples using microarray expression data
    • Furey, T.S., Cristianini, N., Duffy, N., Beddarski, K.W., Schummer, M. and Haussler, "Support vector machine classification and validation of cancer tissue samples using microarray expression data," Bioinformatics, vol. 16, pp.906-914, 2000.
    • (2000) Bioinformatics , vol.16 , pp. 906-914
    • Furey, T.S.1    Cristianini, N.2    Duffy, N.3    Beddarski, K.W.4    Schummer, M.5    Haussler6
  • 10
    • 0036161259 scopus 로고    scopus 로고
    • Gene selection for cancer classification using support vector machines
    • Guyon, I., Weston, J., Barnhill, S. and Vapnik, V., "Gene selection for cancer classification using support vector machines," Machine Learning, vol. 46, pp.389-422, 2002.
    • (2002) Machine Learning , vol.46 , pp. 389-422
    • Guyon, I.1    Weston, J.2    Barnhill, S.3    Vapnik, V.4
  • 11
    • 0038729565 scopus 로고    scopus 로고
    • Classification of multiple cancer types be multicategory support vector machines using gene expression data
    • Lee, Y. and Lee, C.-K., "Classification of multiple cancer types be multicategory support vector machines using gene expression data," Bioinformatics, vol. 18, pp. 1132-1139, 2003.
    • (2003) Bioinformatics , vol.18 , pp. 1132-1139
    • Lee, Y.1    Lee, C.-K.2
  • 14
    • 54949108446 scopus 로고    scopus 로고
    • J. Twycross , Immune Systems, Danger Theory and Intrusion Detection, presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
    • J. Twycross , Immune Systems, "Danger Theory and Intrusion Detection", presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
  • 19
    • 0031700696 scopus 로고    scopus 로고
    • A modified particle swarm optimizer. IEEE World Congress on Computational
    • Shi, Y., Eberhart, R.: A modified particle swarm optimizer. IEEE World Congress on Computational Intelligence, 1998. pp.69-73.
    • (1998) Intelligence , pp. 69-73
    • Shi, Y.1    Eberhart, R.2
  • 20
    • 84901421400 scopus 로고    scopus 로고
    • The Swarm and the Queen: Towards a Deterministic and Adaptive Particle Swarm Optimization
    • Clerc, M.: The Swarm and the Queen: Towards a Deterministic and Adaptive Particle Swarm Optimization. Proceeding of the Congress of Evolutionary Computation, Vol.3, 1999. pp. 1951-1957
    • (1999) Proceeding of the Congress of Evolutionary Computation , vol.3 , pp. 1951-1957
    • Clerc, M.1
  • 23
    • 84899013173 scopus 로고    scopus 로고
    • Support Vector regression Machines,
    • Moser, M, Jordan, M. and Petshe, T, ed, MIT Press, Cambridge, Ma, pp
    • Drucker, H., Burges, C., Kaufman, L., Smola, A. and Vapnik, "Support Vector regression Machines, " in Moser, M., Jordan, M. and Petshe, T. (ed.) Neural Information Processing Systems, Vol. 9. MIT Press, Cambridge, Ma, pp. 155-161. 1997.
    • (1997) Neural Information Processing Systems , vol.9 , pp. 155-161
    • Drucker, H.1    Burges, C.2    Kaufman, L.3    Smola, A.4    Vapnik5
  • 25
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion, Computers & Operations Research
    • W.H. Chen, S.H. Hsu, and H.P. Shen, "Application of SVM and ANN for intrusion, Computers & Operations Research", ELSEVIER, Vol. 32, No.10, 2005, pp. 2617-2634.
    • (2005) ELSEVIER , vol.32 , Issue.10 , pp. 2617-2634
    • Chen, W.H.1    Hsu, S.H.2    Shen, H.P.3
  • 28
    • 33744522522 scopus 로고    scopus 로고
    • Intrusion Detection System Based on Multi-class SVM
    • H. Lee, J. Song, D. Park, "Intrusion Detection System Based on Multi-class SVM", RSFDGrC, Vol. 2, 2005, pp. 511-519.
    • (2005) RSFDGrC , vol.2 , pp. 511-519
    • Lee, H.1    Song, J.2    Park, D.3
  • 29
    • 54949135100 scopus 로고    scopus 로고
    • A. Abraham, R.Jain, Soft Computing Models for Network Intrusion Detection Systems CoRRcs, CR/0405046, 2004.
    • A. Abraham, R.Jain, "Soft Computing Models for Network Intrusion Detection Systems CoRRcs", CR/0405046, 2004.
  • 31
    • 54949114565 scopus 로고    scopus 로고
    • B. Schoelkopf, C. Burges, and V. Vapnik., Extracting support data for a given task. In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA ,1995.
    • B. Schoelkopf, C. Burges, and V. Vapnik., "Extracting support data for a given task". In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA ,1995.
  • 32
    • 54949116795 scopus 로고    scopus 로고
    • S. Knerrr, L. Personnaz, and G. Dreyfus, Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network, In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
    • S. Knerrr, L. Personnaz, and G. Dreyfus, "Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network", In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
  • 33
    • 24944586818 scopus 로고    scopus 로고
    • Network-Based Intrusion Detection with Support Vector Machines
    • D. S. Kim, J. S. Park, "Network-Based Intrusion Detection with Support Vector Machines", ICOIN, 2003, pp. 747-756.
    • (2003) ICOIN , pp. 747-756
    • Kim, D.S.1    Park, J.S.2
  • 34
    • 54949126603 scopus 로고    scopus 로고
    • KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
    • (1999)
  • 36
    • 0003425664 scopus 로고    scopus 로고
    • Support Vector Machines for Classification and Regression,
    • Technical report
    • Steven R. Gunn, "Support Vector Machines for Classification and Regression," Technical report, 1998.
    • (1998)
    • Gunn, S.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.