메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Network intrusion detection method based on radial basic function neural network

Author keywords

Intrusion behaviors; Intrusion detection; K nearest neighbor algorithm; Radial basic function neural network

Indexed keywords

FAST CONVERGENCE; IMPACT FACTOR; INTRUSION BEHAVIORS; INTRUSION DETECTION METHOD; K-NEAREST NEIGHBOR ALGORITHM; LEAST SQUARE METHODS; NETWORK INTRUSION DETECTION METHOD; NETWORK INTRUSIONS; RADIAL BASIC FUNCTION NEURAL NETWORK;

EID: 70349673952     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EBISS.2009.5138016     Document Type: Conference Paper
Times cited : (14)

References (9)
  • 1
    • 66249127408 scopus 로고    scopus 로고
    • Application Research of Support Vector Machine in the Intrusion Detection
    • Wang Guojun, Yue Zhiqiang, "Application Research of Support Vector Machine in the Intrusion Detection", GUANGXI JOURNAL OF LIGHT INDUSTRY, no. 7, pp. 51-52, 2008.
    • (2008) GUANGXI JOURNAL OF LIGHT INDUSTRY , Issue.7 , pp. 51-52
    • Wang, G.1    Yue, Z.2
  • 2
    • 66249136170 scopus 로고    scopus 로고
    • Research of intrusion detection based on neural network optimized by adaptive genetic algorithm
    • Luan Qinglin, Lu Huibin, "Research of intrusion detection based on neural network optimized by adaptive genetic algorithm", Computer Engineering and Design, vol. 29, no. 12, pp. 3022-3025, 2008.
    • (2008) Computer Engineering and Design , vol.29 , Issue.12 , pp. 3022-3025
    • Qinglin, L.1    Lu, H.2
  • 3
    • 0038663399 scopus 로고
    • Xian: Xi an electronic science and technology university press
    • Jiao Licheng. Neural network system theory. Xian: Xi an electronic science and technology university press, 1995.
    • (1995) Neural network system theory
    • Licheng, J.1
  • 5
    • 4344659702 scopus 로고    scopus 로고
    • Anomaly detection methods in wired networks, A survey and taxonomy
    • Juan M E T, Pedro G T, Jesus E D V, et al, "Anomaly detection methods in wired networks", A survey and taxonomy, Computer Communications, vol. 27, no. 16, pp. 1569-1584, 2004.
    • (2004) Computer Communications , vol.27 , Issue.16 , pp. 1569-1584
    • Juan, M.E.T.1    Pedro, G.T.2    Jesus, E.D.V.3
  • 6
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • Theuns V, Ray H, "Intrusion detection techniques and approaches", Computer Communications, vol. 25, no. 15, pp. 1356-1584, 2002.
    • (2002) Computer Communications , vol.25 , Issue.15 , pp. 1356-1584
    • Theuns, V.1    Ray, H.2
  • 7
    • 70349673107 scopus 로고    scopus 로고
    • Lincoln Laboratory, Massachusetts Institute of Technology. DARPA intrusion detection evaluation[EB/OL]. http://www.11.mit.edu/IST/ideval/index. html, 2003-06-16.
    • Lincoln Laboratory, Massachusetts Institute of Technology. DARPA intrusion detection evaluation[EB/OL]. http://www.11.mit.edu/IST/ideval/index. html, 2003-06-16.
  • 8
    • 0037411435 scopus 로고    scopus 로고
    • The neural network models for IDS based on the asymmetric cost s of false negative errors and false positive errors
    • JOO D, HON G T, HAN I, "The neural network models for IDS based on the asymmetric cost s of false negative errors and false positive errors", Expert System with Applications, vol. 25, no. 1, pp. 69-75, 2003.
    • (2003) Expert System with Applications , vol.25 , Issue.1 , pp. 69-75
    • JOO, D.1    HON, G.T.2    HAN, I.3
  • 9
    • 0001683814 scopus 로고
    • Layered neural networks with gaussian hidden units as universal Approximations
    • Hartman E J, Keeler J D, "Layered neural networks with gaussian hidden units as universal Approximations," Neural Computation, no. 2, pp. 210-215, 1990.
    • (1990) Neural Computation , Issue.2 , pp. 210-215
    • Hartman, E.J.1    Keeler, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.