메뉴 건너뛰기




Volumn 5271 LNAI, Issue , 2008, Pages 247-256

Traffic data preparation for a hybrid network IDS

Author keywords

Artificial intelligence; Artificial neural networks; Computer network security; Hybrid artificial intelligence systems; Network intrusion detection; Projection methods; Unsupervised learning

Indexed keywords

ARTIFICIAL INTELLIGENCE TECHNIQUES; ARTIFICIAL NEURAL NETWORKS; HYBRID ARTIFICIAL INTELLIGENCE SYSTEMS; HYBRID NETWORK; INTRUSION DETECTION SYSTEMS; MULTI-AGENT; NETWORK INTRUSION DETECTION; NEURAL MODELS; ON THE FLIES; PROJECTION METHODS; TRAFFIC DATA;

EID: 70350536810     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-87656-4_31     Document Type: Conference Paper
Times cited : (6)

References (33)
  • 1
    • 70350553601 scopus 로고    scopus 로고
    • Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical Report, Washington, PA, James P. Anderson Co. (1980)
    • Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical Report, Washington, PA, James P. Anderson Co. (1980)
  • 2
    • 61349189046 scopus 로고    scopus 로고
    • Herrero, Á., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. In: Innovations in Hybrid Intelligent Systems. Advances in Soft Computing, 44, pp. 320-328. Springer, Heidelberg (2007)
    • Herrero, Á., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. In: Innovations in Hybrid Intelligent Systems. Advances in Soft Computing, vol. 44, pp. 320-328. Springer, Heidelberg (2007)
  • 4
    • 33745590283 scopus 로고    scopus 로고
    • A Multi-agent Based System for Intrusion Detection
    • Hegazy, I.M., Al-Arif, T., Fayed, Z.T., Faheem, H.M.: A Multi-agent Based System for Intrusion Detection. IEEE Potentials 22(4), 28-31 (2003)
    • (2003) IEEE Potentials , vol.22 , Issue.4 , pp. 28-31
    • Hegazy, I.M.1    Al-Arif, T.2    Fayed, Z.T.3    Faheem, H.M.4
  • 6
    • 33745660126 scopus 로고    scopus 로고
    • Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, 3842, pp. 965-970. Springer, Heidelberg (2006)
    • Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 965-970. Springer, Heidelberg (2006)
  • 7
    • 35048820538 scopus 로고    scopus 로고
    • APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
    • Karmouch, A, Korba, L, Madeira, E.R.M, eds, MATA, Springer, Heidelberg
    • Deeter, K., Singh, K., Wilson, S., Filipozzi, L., Vuong, S.: APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, vol. 3284, pp. 244-253. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3284 , pp. 244-253
    • Deeter, K.1    Singh, K.2    Wilson, S.3    Filipozzi, L.4    Vuong, S.5
  • 8
    • 33745163595 scopus 로고    scopus 로고
    • Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, 3617, pp. 50-57. Springer, Heidelberg (2005)
    • Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 50-57. Springer, Heidelberg (2005)
  • 9
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-Nearest Neighbor Classifier for Intrusion Detection
    • Liao, Y.H., Vemuri, V.R.: Use of K-Nearest Neighbor Classifier for Intrusion Detection. Computers & Security 21(5), 439-448 (2002)
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.H.1    Vemuri, V.R.2
  • 12
    • 33646252706 scopus 로고    scopus 로고
    • Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
    • Duch, W, Kacprzyk, J, Oja, E, Zadrożny, S, eds, ICANN 2005, Springer, Heidelberg
    • Corchado, E., Herrero, A., Sáiz, J.M.: Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadrożny, S. (eds.) ICANN 2005. LNCS, vol. 3697, pp. 905-910. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3697 , pp. 905-910
    • Corchado, E.1    Herrero, A.2    Sáiz, J.M.3
  • 13
    • 35048866479 scopus 로고    scopus 로고
    • Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection
    • Pal, N.R, Kasabov, N, Mudi, R.K, Pal, S, Parui, S.K, eds, ICONIP 2004, Springer, Heidelberg
    • Sindhu, S.S.S., Ramasubramanian, P., Kannan, A.: Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection. In: Pal, N.R., Kasabov, N., Mudi, R.K., Pal, S., Parui, S.K. (eds.) ICONIP 2004. LNCS, vol. 3316, pp. 983-988. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3316 , pp. 983-988
    • Sindhu, S.S.S.1    Ramasubramanian, P.2    Kannan, A.3
  • 14
    • 33749405937 scopus 로고    scopus 로고
    • Feature Selection of Intrusion Detection Data Using a Hybrid Genetic Algorithm/KNN Approach
    • IOS Press, Amsterdam
    • Middlemiss, M., Dick, G.: Feature Selection of Intrusion Detection Data Using a Hybrid Genetic Algorithm/KNN Approach. In: Design and application of hybrid intelligent systems, pp. 519-527. IOS Press, Amsterdam (2003)
    • (2003) Design and application of hybrid intelligent systems , pp. 519-527
    • Middlemiss, M.1    Dick, G.2
  • 18
    • 33750943764 scopus 로고    scopus 로고
    • Hall, M., Wiley, K.: Capacity Verification for High Speed Network Intrusion Detection Systems. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, 2516, pp. 239-251. Springer, Heidelberg (2002)
    • Hall, M., Wiley, K.: Capacity Verification for High Speed Network Intrusion Detection Systems. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 239-251. Springer, Heidelberg (2002)
  • 22
    • 3543075142 scopus 로고    scopus 로고
    • Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit
    • Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery 8(3), 203-225 (2004)
    • (2004) Data Mining and Knowledge Discovery , vol.8 , Issue.3 , pp. 203-225
    • Corchado, E.1    MacDonald, D.2    Fyfe, C.3
  • 23
    • 0842267461 scopus 로고    scopus 로고
    • Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors
    • Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. Int. Journal of Pattern Recognition and Artificial Intelligence 17(8), 1447-1466 (2003)
    • (2003) Int. Journal of Pattern Recognition and Artificial Intelligence , vol.17 , Issue.8 , pp. 1447-1466
    • Corchado, E.1    Fyfe, C.2
  • 24
    • 0028401306 scopus 로고
    • Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches
    • Aamodt, A., Plaza, E.: Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches. AI Communications 7(1), 39-59 (1994)
    • (1994) AI Communications , vol.7 , Issue.1 , pp. 39-59
    • Aamodt, A.1    Plaza, E.2
  • 32
    • 0036570725 scopus 로고    scopus 로고
    • Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
    • Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
  • 33
    • 4243116400 scopus 로고    scopus 로고
    • The Spinning Cube of Potential Doom
    • Stephen, L.: The Spinning Cube of Potential Doom. Commun. ACM 47(6), 25-26 (2004)
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 25-26
    • Stephen, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.