메뉴 건너뛰기




Volumn , Issue , 2008, Pages 61-67

Efficient detection of DDoS attacks with important attributes

Author keywords

Attribute selection; Bayesian networks; C4.5; DDoS attack detection; Intrusion detection system

Indexed keywords

BAYESIAN NETWORKS; COMPUTER CRIME; COMPUTERS; DISTRIBUTED PARAMETER NETWORKS; INFERENCE ENGINES; INTELLIGENT NETWORKS; INTERNET; SPEECH ANALYSIS;

EID: 63249108778     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2008.4757464     Document Type: Conference Paper
Times cited : (33)

References (16)
  • 1
    • 63249134846 scopus 로고    scopus 로고
    • DARPA Intrusion Detection Evaluation
    • DARPA Intrusion Detection Evaluation, http://www.ll.mit.edu/IST/ideval/ docs/docs-index.html, 1999.
    • (1999)
  • 7
    • 0003846041 scopus 로고
    • A Tutorial on Learning With Bayesian Networks, Microsoft Research
    • Technical Report MSRTR-95-06, March
    • D. Heckerman, A Tutorial on Learning With Bayesian Networks, Microsoft Research, Technical Report MSRTR-95-06, March 1995.
    • (1995)
    • Heckerman, D.1
  • 8
    • 63249108352 scopus 로고    scopus 로고
    • J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993.
    • J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993.
  • 9
    • 63249125123 scopus 로고    scopus 로고
    • KDD Cup 1999 data (network intrusion detection): http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.ht ml.
    • KDD Cup 1999 data (network intrusion detection): http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.ht ml.
  • 10
    • 27144518261 scopus 로고    scopus 로고
    • A novel anomaly detection scheme based on principal component classifier
    • M. Shyu, S. Chen, K. Sarinnapakorn, L. Chang, A novel anomaly detection scheme based on principal component classifier, pp. 172-179, ICDM workshop 2003.
    • (2003) ICDM workshop , pp. 172-179
    • Shyu, M.1    Chen, S.2    Sarinnapakorn, K.3    Chang, L.4
  • 12
    • 37049002837 scopus 로고    scopus 로고
    • Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection
    • W. Wang, X. Guan and X. Zhang, "Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection". Computer Communications, vol. 31, no. 1, pp. 58-72, 2008.
    • (2008) Computer Communications , vol.31 , Issue.1 , pp. 58-72
    • Wang, W.1    Guan, X.2    Zhang, X.3
  • 16
    • 84943383590 scopus 로고    scopus 로고
    • Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks
    • A. H. Sung, S. Mukkamala, "Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks", Symposium on Applications and the Internet, 2003.
    • (2003) Symposium on Applications and the Internet
    • Sung, A.H.1    Mukkamala, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.