메뉴 건너뛰기




Volumn 7, Issue 12, 2008, Pages 1222-1228

A real-time intrusion detection algorithm for network security

Author keywords

And neural network; Clustering; Cross correlation; Data mining; EGovernment; Fast intrusion detection; Frequency domain

Indexed keywords

ALARM SYSTEMS; CLUSTER ANALYSIS; COMPUTER CRIME; DATA MINING; FREQUENCY DOMAIN ANALYSIS; GOVERNMENT DATA PROCESSING; INFORMATION MANAGEMENT; INTERNET; LOCAL AREA NETWORKS; MATLAB; NETWORK SECURITY; NEURAL NETWORKS; SECURITY OF DATA; SIGNAL DETECTION; TIME DELAY;

EID: 59249103742     PISSN: 11092742     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (23)
  • 2
    • 27544512530 scopus 로고    scopus 로고
    • Data Mining for Intrusion Detection: A Critical Review
    • Kluwer Academic Publisher, Boston
    • K. Julisch, "Data Mining for Intrusion Detection: A Critical Review", Applications of Data Mining in Computer Security, Kluwer Academic Publisher, Boston, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Julisch, K.1
  • 3
    • 26844574201 scopus 로고    scopus 로고
    • Applying Data Mining To Intrusion Detection: The Quest For Automation, Efficiency, And Credibility
    • December
    • W. Lee, "Applying Data Mining To Intrusion Detection: The Quest For Automation, Efficiency, And Credibility", SIGKDD Explorations, Volume 4, Issue 2, December 2002.
    • (2002) SIGKDD Explorations , vol.4 , Issue.2
    • Lee, W.1
  • 11
    • 3042635764 scopus 로고    scopus 로고
    • Identifying Outliers via Clustering for Anomaly Detection
    • Technical Report
    • M. H. Arshad and P. K. Chan, "Identifying Outliers via Clustering for Anomaly Detection", Technical Report, 2003.
    • (2003)
    • Arshad, M.H.1    Chan, P.K.2
  • 13
    • 0036575196 scopus 로고    scopus 로고
    • Grid and Dummy Cluster Based Learning of Normal and Intrusive Clusters for Computer Intrusion Detection
    • X. Li and N. Ye, "Grid and Dummy Cluster Based Learning of Normal and Intrusive Clusters for Computer Intrusion Detection", Quality and Reliability Engineering International, Vol. 18, No. 3, 2002.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.3
    • Li, X.1    Ye, N.2
  • 16
    • 59249084775 scopus 로고    scopus 로고
    • Lincoln Laboratory ID Evaluation Website, MIT
    • Lincoln Laboratory ID Evaluation Website, MIT, http://www.ll.mit.edu/ IST/ideval/index.html.
  • 17
    • 37249031979 scopus 로고    scopus 로고
    • New Faster Normalized Neural Networks for Sub-Matrix Detection using Cross Correlation in the Frequency Domain and Matrix Decomposition
    • March
    • H. M. El-Bakry, "New Faster Normalized Neural Networks for Sub-Matrix Detection using Cross Correlation in the Frequency Domain and Matrix Decomposition," Applied Soft Computing journal, vol. 8, issue 2, March 2008, pp. 1131-1149.
    • (2008) Applied Soft Computing journal , vol.8 , Issue.2 , pp. 1131-1149
    • El-Bakry, H.M.1
  • 18
    • 84968470212 scopus 로고
    • An algorithm for the machine calculation of complex Fourier series
    • J. W. Cooley, and J. W. Tukey, "An algorithm for the machine calculation of complex Fourier series," Math. Comput. 19, 297-301 (1965).
    • (1965) Math. Comput , vol.19 , pp. 297-301
    • Cooley, J.W.1    Tukey, J.W.2
  • 20
    • 33746246442 scopus 로고    scopus 로고
    • Complex-Valued Neural Networks Theories and Applications
    • Nov
    • A. Hirose, "Complex-Valued Neural Networks Theories and Applications", Series on innovative Intellegence, vol.5. Nov. 2003.
    • (2003) Series on innovative Intellegence , vol.5
    • Hirose, A.1
  • 22
    • 33847708385 scopus 로고    scopus 로고
    • An Architecuture for Mining the Egyptian E-Government Network traffic for Intrusion Detection
    • Information Technology Institute, Cairo, Egypt, December
    • A. M. Riad, M. M. Fahmy and M. A. El-Sharkawy, " An Architecuture for Mining the Egyptian E-Government Network traffic for Intrusion Detection", International Conference on Information and Communication Technology (ICICT 2005), pp. 593-603, Information Technology Institute, Cairo, Egypt, December, 2005.
    • (2005) International Conference on Information and Communication Technology (ICICT , pp. 593-603
    • Riad, A.M.1    Fahmy, M.M.2    El-Sharkawy, M.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.