메뉴 건너뛰기




Volumn 5, Issue , 2004, Pages 3178-3182

The research and implementation of intelligent intrusion detection system based on artificial neural network

Author keywords

Anomaly based system; Artificial Neural Network; Intrusion Detection System; Network security

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER NETWORKS; COMPUTER SIMULATION; DATA ACQUISITION; NEURAL NETWORKS; RESEARCH AND DEVELOPMENT MANAGEMENT; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 6344260530     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (8)
  • 1
    • 0037411435 scopus 로고    scopus 로고
    • The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
    • D. Joo, T. Hong and I. Han, "The Neural Network Models for IDS based on the asymmetric costs of false negative errors and false positive errors", Expert Systems with Applications, Vol. 25, pp. 69-75, 2003
    • (2003) Expert Systems with Applications , vol.25 , pp. 69-75
    • Joo, D.1    Hong, T.2    Han, I.3
  • 3
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • R. P. Lippmann and R. K. Cunningham, "Improving Intrusion Detection Performance using Keyword Selection and Neural Networks", Computer Networks, Vol. 34, No. 4, pp. 597-603, 2000
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 597-603
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 4
    • 6344255762 scopus 로고    scopus 로고
    • Next generation intrusion detection: Autonomous reinforcement learning of network attacks
    • Baltimore, 16-19 October
    • J. Cannady, "Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks", Proc. 23rd National Information Systems Security Conference, pp. 1-12, Baltimore, 16-19 October 2000
    • (2000) Proc. 23rd National Information Systems Security Conference , pp. 1-12
    • Cannady, J.1
  • 6
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • G. Giacinto, F. Roli and L. Didaci, "Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks", Pattern Recognition Letters, Vol. 24, pp. 1795-1803, 2003
    • (2003) Pattern Recognition Letters , vol.24 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 7
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques an dapproaches
    • T. Verwoerd an dR. Hunt, "Intrusion Detection Techniques an dApproaches", Computer Communications, Vol. 25, No. 15, pp. 1356-1365, 2002
    • (2002) Computer Communications , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, D.2
  • 8
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusion in computer networks
    • D. Dasgupta and F. Gonzalez, "An Immunity-Based Technique to Characterize Intrusion in Computer Networks", IEEE Trans. On Evolutionary Computation, Vol. 6, No 3, pp. 1081-1088, 2002
    • (2002) IEEE Trans. on Evolutionary Computation , vol.6 , Issue.3 , pp. 1081-1088
    • Dasgupta, D.1    Gonzalez, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.