메뉴 건너뛰기




Volumn , Issue , 2008, Pages 665-670

On the use of decision trees as behavioral approaches in intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; ROBOT LEARNING;

EID: 60649109609     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMLA.2008.63     Document Type: Conference Paper
Times cited : (10)

References (21)
  • 2
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Technical Report 99-15. Chalmers Univ, March
    • Stefan Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15. Chalmers Univ.. March 2000.
    • (2000)
    • Axelsson, S.1
  • 5
    • 58049117116 scopus 로고    scopus 로고
    • Classification features for detecting serverside and client-side web attacks
    • Milan. Italy
    • S. Benferhat and K. Tabia. Classification features for detecting serverside and client-side web attacks. In SEC2008 : 23rd International Security Conference. Milan. Italy, 2008.
    • (2008) SEC2008 : 23rd International Security Conference
    • Benferhat, S.1    Tabia, K.2
  • 6
    • 33847218306 scopus 로고    scopus 로고
    • On the combination of naive bayes and decision trees for intrusion detection
    • Salem Benferhat and Karim Tabia. On the combination of naive bayes and decision trees for intrusion detection. In CIMCA05, pages 211-216, 2005.
    • (2005) CIMCA05 , pp. 211-216
    • Benferhat, S.1    Tabia, K.2
  • 10
    • 0038428854 scopus 로고    scopus 로고
    • Results of the kdd'99 classifier learning
    • Charles Elkan. Results of the kdd'99 classifier learning. SIGKDD Explorations. 1 (2):63-64, 2000.
    • (2000) SIGKDD Explorations , vol.1 , Issue.2 , pp. 63-64
    • Elkan, C.1
  • 11
    • 38149142569 scopus 로고    scopus 로고
    • Comparing anomaly detection techniques for http
    • Kenneth L. Ingham and Hajime Inoue. Comparing anomaly detection techniques for http. In RAID, pages 42-62, 2007.
    • (2007) RAID , pp. 42-62
    • Ingham, K.L.1    Inoue, H.2
  • 13
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 darpa off-line intrusion detection evaluation
    • Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das. The 1999 darpa off-line intrusion detection evaluation. Comput. Networks, 34 (4):579-595, 2000.
    • (2000) Comput. Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 15
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J. R. Quinlan. Induction of decision trees. Much. Learn., 1 (1), 1986.
    • (1986) Much. Learn , vol.1 , Issue.1
    • Quinlan, J.R.1
  • 16
    • 60649108144 scopus 로고    scopus 로고
    • J. Ross Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc.. San Francisco. CA. USA. 1993.
    • J. Ross Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc.. San Francisco. CA. USA. 1993.
  • 17
    • 0018015137 scopus 로고
    • Modelling by the shortest data description
    • J Rissanen. Modelling by the shortest data description. Automatica, 14:465-471, 1978.
    • (1978) Automatica , vol.14 , pp. 465-471
    • Rissanen, J.1
  • 18
    • 60649105255 scopus 로고    scopus 로고
    • Abdallah Abbey Sebyala, Temitope Olukemi, and Lionel Sacks. Active platform security through intrusion detection using naive bayesian network for anomaly detection. In Proceedings of the London Communications Symposium 2002, 2002.
    • Abdallah Abbey Sebyala, Temitope Olukemi, and Lionel Sacks. Active platform security through intrusion detection using naive bayesian network for anomaly detection. In Proceedings of the London Communications Symposium 2002, 2002.
  • 21
    • 84944220475 scopus 로고    scopus 로고
    • Adaptive, model-based monitoring for cyber attack detection
    • Alfonso Valdes and Keith Skinner. Adaptive, model-based monitoring for cyber attack detection. In Recent Advances in Intrusion Detection, pages 80-92, 2000.
    • (2000) Recent Advances in Intrusion Detection , pp. 80-92
    • Valdes, A.1    Skinner, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.