메뉴 건너뛰기




Volumn 36, Issue 3 PART 1, 2009, Pages 5605-5612

Data mining-based intrusion detectors

Author keywords

Classification tree; Internet attack; Intrusion detection system (IDS); Support vector machine

Indexed keywords

COMPUTER CRIME; DATA MINING; NETWORK SECURITY; SUPPORT VECTOR MACHINES;

EID: 58349096877     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2008.06.138     Document Type: Article
Times cited : (86)

References (23)
  • 3
    • 58349117590 scopus 로고    scopus 로고
    • Anderson, James P. (1980). Computer security threat monitoring and surveillance, technical report, James P. Anderson Co., Fort Washington, Pennsylvania.
    • Anderson, James P. (1980). Computer security threat monitoring and surveillance, technical report, James P. Anderson Co., Fort Washington, Pennsylvania.
  • 4
    • 58349114585 scopus 로고    scopus 로고
    • Bace, Rebecca G. (2002). NIST special publication on intrusion detection systems.
    • Bace, Rebecca G. (2002). NIST special publication on intrusion detection systems.
  • 5
    • 58349113771 scopus 로고    scopus 로고
    • Ben Amor, Nahla, Benferhat Rue, Salem, Elouedi, Zied. (2004). Nai{dotless}̈ve Bayes. vs. decision trees. In: Symposium on applied computing proceedings of the 2004 ACM symposium on applied computing.
    • Ben Amor, Nahla, Benferhat Rue, Salem, Elouedi, Zied. (2004). Nai{dotless}̈ve Bayes. vs. decision trees. In: Symposium on applied computing proceedings of the 2004 ACM symposium on applied computing.
  • 6
    • 58349116763 scopus 로고    scopus 로고
    • Confusion Matrix. .
    • Confusion Matrix. .
  • 7
    • 0023294428 scopus 로고    scopus 로고
    • Dorothy, Denning. 1987. An intrusion detection model. IEEE Transaction on Software Engineering.
    • Dorothy, Denning. 1987. An intrusion detection model. IEEE Transaction on Software Engineering.
  • 8
    • 58349111441 scopus 로고    scopus 로고
    • Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD). http://www.sdl.sri.com/projects/emerald/.
    • Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD). http://www.sdl.sri.com/projects/emerald/.
  • 12
    • 33644860127 scopus 로고    scopus 로고
    • A clustering-based method for unsupervised intrusion detections
    • Jiang S.Y., et al. A clustering-based method for unsupervised intrusion detections. Pattern Recognition Letters (2006)
    • (2006) Pattern Recognition Letters
    • Jiang, S.Y.1
  • 13
    • 58349112037 scopus 로고    scopus 로고
    • KDD Cup99 Winner. .
    • KDD Cup99 Winner. .
  • 14
    • 58349104486 scopus 로고    scopus 로고
    • Kuo-Hua Yang (2006). Intrusion Detection Systems based on Hybrid Hidden Markov Models and Naïve Bayes Classifiers. National Taiwan University of Science and Technology. URN: etd-0728106-205122. Master thesis.
    • Kuo-Hua Yang (2006). Intrusion Detection Systems based on Hybrid Hidden Markov Models and Naïve Bayes Classifiers. National Taiwan University of Science and Technology. URN: etd-0728106-205122. Master thesis.
  • 15
    • 58349104708 scopus 로고    scopus 로고
    • Libsvm. http://www.csie.ntu.edu.tw/~cjlin/libsvm/.
    • Libsvm. http://www.csie.ntu.edu.tw/~cjlin/libsvm/.
  • 16
    • 33745728475 scopus 로고    scopus 로고
    • Lu, C. -T., Boedihardjo, A. P., Manalwar, P. (2005). Exploiting efficient data mining techniques to enhance intrusion detection systems. in: Information Reuse and Integration, Conf 2005, IRI - 2005 IEEE International Conference on.
    • Lu, C. -T., Boedihardjo, A. P., Manalwar, P. (2005). Exploiting efficient data mining techniques to enhance intrusion detection systems. in: Information Reuse and Integration, Conf 2005, IRI - 2005 IEEE International Conference on.
  • 17
    • 34447280122 scopus 로고    scopus 로고
    • Network anomaly detection with incomplete audit data
    • Patcha A., and Park J.-M. Network anomaly detection with incomplete audit data. Elsevier Computer Networks 51 13 (2007)
    • (2007) Elsevier Computer Networks , vol.51 , Issue.13
    • Patcha, A.1    Park, J.-M.2
  • 18
    • 58349088629 scopus 로고    scopus 로고
    • Prelude. .
    • Prelude. .
  • 21
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • Verwoerd T., and Hunt R. Intrusion detection techniques and approaches. Computer Communications 25 15 (2002) 1356-1365
    • (2002) Computer Communications , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 22
    • 58349119277 scopus 로고    scopus 로고
    • Weka. .
    • Weka. .
  • 23
    • 58349096820 scopus 로고    scopus 로고
    • Yu-Shan Hsu (2006). A Hybrid IDS Framework via Decision Trees and SVMs. National Taiwan University of Science and Technology. Master thesis.
    • Yu-Shan Hsu (2006). A Hybrid IDS Framework via Decision Trees and SVMs. National Taiwan University of Science and Technology. Master thesis.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.