메뉴 건너뛰기




Volumn 4, Issue 2, 2008, Pages 413-424

Intrusion detection using a hybrid support vector machine based on entropy and tf-idf

Author keywords

Entropy; Intrusion detection system; Support vector machine; TF IDF

Indexed keywords


EID: 63649137061     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (51)

References (30)
  • 1
    • 0038103911 scopus 로고    scopus 로고
    • Utilising fuzzy logic and trend analysis for effective intrusion detection
    • M. Botha and R.V. Solms, Utilising fuzzy logic and trend analysis for effective intrusion detection, Computers & Security, pp.423-434, 2003.
    • (2003) Computers & Security , pp. 423-434
    • Botha, M.1    Solms, R.V.2
  • 2
    • 10844230994 scopus 로고    scopus 로고
    • Intrusion detection using an ensemble of intelligent paradigms
    • S. Mukkamala, Andrew H. Sung and A. Abraham, Intrusion detection using an ensemble of intelligent paradigms, Computer Application, pp.167-182, 2005.
    • (2005) Computer Application , pp. 167-182
    • Mukkamala, S.1    Sung, A.H.2    Abraham, A.3
  • 4
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • T. Verwoerd and R. Hunt, Intrusion detection techniques and approaches, Computer Communications, pp.1356-1365, 2002.
    • (2002) Computer Communications , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 8
    • 0035879674 scopus 로고    scopus 로고
    • Intrusion detection through learning behavior model
    • B. Balajinath and S. V. Raghavan, Intrusion detection through learning behavior model, Computer Communications, pp.1202-1212, 2001.
    • (2001) Computer Communications , pp. 1202-1212
    • Balajinath, B.1    Raghavan, S.V.2
  • 10
    • 21844433474 scopus 로고    scopus 로고
    • Application of online-training SVMs for real-time intrusion detection with different considerations
    • Z. Zhang and H. Shen, Application of online-training SVMs for real-time intrusion detection with different considerations, Computer Communications, pp. 1428-1442, 2005.
    • (2005) Computer Communications , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2
  • 13
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-nearest neighbor classifier for intrusion detection
    • Y. Liao and V. Rao Vemuri, Use of K-nearest neighbor classifier for intrusion detection, Computers & Security, pp.439-448, 2002.
    • (2002) Computers & Security , pp. 439-448
    • Liao, Y.1    Rao Vemuri, V.2
  • 14
    • 48249123309 scopus 로고    scopus 로고
    • Comparison with fuzzy reasoning and modified TF-IDF in page grouping for the result of web retrieval
    • T. Miyoshi and H. Joichi, Comparison with fuzzy reasoning and modified TF-IDF in page grouping for the result of web retrieval, International Journal of Innovative Computing, Information and Control, vol.3, no.2, pp.307-318, 2007.
    • (2007) International Journal of Innovative Computing, Information and Control , vol.3 , Issue.2 , pp. 307-318
    • Miyoshi, T.1    Joichi, H.2
  • 16
    • 2342576784 scopus 로고    scopus 로고
    • Predicting the intrusion intentions by observing system call sequences
    • L. Feng, X. Guan, S. Guo, Y. Gao and P. Liu, Predicting the intrusion intentions by observing system call sequences, Computers & Security, pp.241-252, 2004.
    • (2004) Computers & Security , pp. 241-252
    • Feng, L.1    Guan, X.2    Guo, S.3    Gao, Y.4    Liu, P.5
  • 17
  • 18
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D. Y. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, pp.229-243, 2003.
    • (2003) Pattern Recognition , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 20
    • 0742268832 scopus 로고    scopus 로고
    • H. Y. Kao, S. H. Lin, J. M. Ho and M. S. Chen, Mining web informative structures and contents based on entropy Analysis, IEEE Trans, on Knowledge and Data Engineering, ρp.41-55, 2004.
    • H. Y. Kao, S. H. Lin, J. M. Ho and M. S. Chen, Mining web informative structures and contents based on entropy Analysis, IEEE Trans, on Knowledge and Data Engineering, ρp.41-55, 2004.
  • 21
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • O. Depren, M. Topallar, E. Anarim and M. Kemal Ciliz, An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert Systems with Applications, pp.713-722, 2005.
    • (2005) Expert Systems with Applications , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Kemal Ciliz, M.4
  • 22
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • G. Giacinto, F. Roli and L. Didaci, Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition, pp.1795-1803, 2003.
    • (2003) Pattern Recognition , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 23
    • 33646156614 scopus 로고    scopus 로고
    • Web page classification based on a support vector machine using a weighted vote schema
    • R. C. Chen and C. H. Hsieh, Web page classification based on a support vector machine using a weighted vote schema, Expert System with Applications, vol.31, pp.427-435, 2006.
    • (2006) Expert System with Applications , vol.31 , pp. 427-435
    • Chen, R.C.1    Hsieh, C.H.2
  • 24
    • 63649129725 scopus 로고    scopus 로고
    • MIT
    • MIT, http://www.ll.mit.edu/IST/ideval/data/1998/1998.dataJndex.html
  • 25
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S. J. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, no.4, pp.227-261, 2003.
    • (2003) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 26
    • 63649159289 scopus 로고    scopus 로고
    • C.-C. Chang and C.-J. Lin, LIBSVM - A Library for Support Vector Machines, http://www.csie.ntu.edu.tw/cjlin/libsvm
    • C.-C. Chang and C.-J. Lin, LIBSVM - A Library for Support Vector Machines, http://www.csie.ntu.edu.tw/cjlin/libsvm
  • 27
    • 63649122697 scopus 로고    scopus 로고
    • Website, http://163.17.27.154/dataset.
    • Website
  • 28
    • 37249033556 scopus 로고    scopus 로고
    • Guide of LIBSVM, http://www.csie.ntu.edu.tw/cjlin/papers/guide/guide.pdf
    • Guide of LIBSVM
  • 30
    • 37249033556 scopus 로고    scopus 로고
    • Guide of LIBSVM, http://www.csie.ntu.edu.tw/cjlin/libsvm/faq.html
    • Guide of LIBSVM


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.