메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1236-1241

The affect of fuzzification on neural networks intrusion detection system

Author keywords

Fuzzy set; Intrusion detection; Neural network

Indexed keywords

DETECTION SYSTEM; FALSE NEGATIVE RATE; FALSE POSITIVE RATES; FUZZIFICATIONS; INTRUSION DETECTION SYSTEMS; NETWORK SYSTEMS; NETWORK TRAFFIC; RUNTIMES; SYSTEM OPERATION; USER ACTIVITY;

EID: 70349303305     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIEA.2009.5138399     Document Type: Conference Paper
Times cited : (27)

References (17)
  • 1
    • 85055927726 scopus 로고    scopus 로고
    • Network Security Principles and Practices,
    • November 15
    • By Saadat Malik," Network Security Principles and Practices", chapter 14, November 15, 2002.
    • (2002)
    • Saadat Malik, B.1
  • 2
    • 0023294428 scopus 로고
    • An Intrusion-Detection Model
    • February
    • Dorothy E. Denning, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, Vol. SE-13. No. 2, February 1987, pp. 222-232.
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 3
    • 0004084716 scopus 로고
    • STAT: A State Transition Analysis Tools for Intrusion Detection
    • MSc Thesis, Department of Computer Science, University of California Santa Barbara
    • Porras, P. A., "STAT: A State Transition Analysis Tools for Intrusion Detection", MSc Thesis, Department of Computer Science, University of California Santa Barbara, 1992, pp. 15-20.
    • (1992) , pp. 15-20
    • Porras, P.A.1
  • 5
    • 0003518833 scopus 로고
    • Classification and Detection of Computer Intrusions
    • A PHD Dissertation to the Faculty of Purdue University, August
    • Sandeep Kumar, "Classification and Detection of Computer Intrusions", A PHD Dissertation to the Faculty of Purdue University, August 1995, pp. 49-51.
    • (1995) , pp. 49-51
    • Kumar, S.1
  • 6
    • 70349347498 scopus 로고    scopus 로고
    • Integrating Artificial Immune Algorithms for Intrusion Detection
    • Dissertation in University of London
    • Jung won Kim, "Integrating Artificial Immune Algorithms for Intrusion Detection", Dissertation in University of London, 2002, pp, 1-5.
    • (2002) , pp. 1-5
    • Jung won Kim1
  • 7
    • 70349361814 scopus 로고    scopus 로고
    • Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, & Philip K. Chan, Cost-based modeling for Fraud and Intrusion Detection: Results from the JAM roject, 2000, http://www1.cs.columbia.edu/jam/recent- project-papers.html, last access day 28-july-2007, pp. 1-15.
    • Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, & Philip K. Chan, "Cost-based modeling for Fraud and Intrusion Detection: Results from the JAM roject", 2000, http://www1.cs.columbia.edu/jam/recent- project-papers.html, last access day 28-july-2007, pp. 1-15.
  • 8
    • 62849107731 scopus 로고    scopus 로고
    • Efficient Intrusion Detection Using Principal Component Analysis
    • last accessed in 29-07-2007
    • Yacine Bouzida, Frederic Cuppens, Nora Cuppens-Boulahia & Sylvain Gombault, "Efficient Intrusion Detection Using Principal Component Analysis", 2004 http://www.rennes.enstbretagne.fr/~fcuppens/article/sar04. pdf, last accessed in 29-07-2007.
    • (2004)
    • Bouzida, Y.1    Cuppens, F.2    Cuppens-Boulahia, N.3    Gombault, S.4
  • 10
    • 70349369467 scopus 로고    scopus 로고
    • M. Hellmann, Fuzzy logic introduction, a Laboratories Antennas Radar Telecom, F.R.E CNRS 2272, Equipe Radar Polarimetrie, France, 2000.
    • M. Hellmann, "Fuzzy logic introduction", a Laboratories Antennas Radar Telecom, F.R.E CNRS 2272, Equipe Radar Polarimetrie, France, 2000.
  • 11
    • 70349352221 scopus 로고
    • The Fuzzy Systems Hand book
    • Earl Cox, "The Fuzzy Systems Hand book", Ap Professional Book, 1994.
    • (1994) Ap Professional Book
    • Cox, E.1
  • 13
    • 70349365151 scopus 로고    scopus 로고
    • Susan M. Al-naqshabandi, Simulation system for computer network intrusion detection, a thesis submitted in partial fulfillment of the requirements for the degree of doctor of philosophy in computer science, Al-Nahrain University, Baghdad, Iraq, 2007, pp. 61-66.
    • Susan M. Al-naqshabandi, "Simulation system for computer network intrusion detection", a thesis submitted in partial fulfillment of the requirements for the degree of doctor of philosophy in computer science, Al-Nahrain University, Baghdad, Iraq, 2007, pp. 61-66.
  • 15
    • 70349350844 scopus 로고    scopus 로고
    • Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
    • December
    • Veselina G. Jecheva, Evgeniya P. Nikolova," Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems" Journal of software, VOL. 2, NO. 6, December 2007, pp, 48-50.
    • (2007) Journal of software , vol.2 , Issue.6 , pp. 48-50
    • Jecheva, V.G.1    Nikolova, E.P.2
  • 16
    • 19944364877 scopus 로고    scopus 로고
    • Feature detection and ensemble design of intrusion detection systems
    • Chebrolu S, Abraham A, Thomas JP." Feature detection and ensemble design of intrusion detection systems". Comput Secur; 24: pp. 295-307, 2005.
    • (2005) Comput Secur , vol.24 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 17
    • 84873993999 scopus 로고    scopus 로고
    • KDD-cup data set. http://kdd.ics.uci.edu/data-bases/kddcup99/kddcup.html.
    • KDD-cup data set


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.