메뉴 건너뛰기




Volumn , Issue , 2009, Pages 465-470

Using rough set and support vector machine for network intrusion detection system

Author keywords

Rough Set; Support Vector Machine; Intrusion Detection System; Attack Detection Rate

Indexed keywords

FALSE POSITIVE RATES; IDS(INTRUSION DETECTION SYSTEM); NETWORK INTRUSION DETECTION SYSTEMS; NORMAL BEHAVIOR; PREPROCESS; ROUGH SET; ROUGH SET SUPPORT VECTOR MACHINE INTRUSION DETECTION SYSTEM ATTACK DETECTION RATE; SPACE DENSITIES; SVM MODEL; SVM(SUPPORT VECTOR MACHINE);

EID: 70449111492     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACIIDS.2009.59     Document Type: Conference Paper
Times cited : (70)

References (14)
  • 1
    • 0035879674 scopus 로고    scopus 로고
    • Intrusion detection through learning behavior model
    • 2001
    • B. Balajinath, and S. V. Raghavan, Intrusion Detection Through Learning Behavior Model. Computer Communications vol. 24, pp.1202-1212, 2001, 2001.
    • (2001) Computer Communications , vol.24 , pp. 1202-1212
    • Balajinath, B.1    Raghavan, S.V.2
  • 3
    • 70449108815 scopus 로고    scopus 로고
    • The application of genetic algorithm to attribute selection and discretization for rough set theory
    • Hua Fan University Taiwan
    • C. L. Huang and W. C. Tang, The Application of Genetic Algorithm to Attribute Selection and Discretization for Rough Set Theory. Information Management Thesis, Hua Fan University Taiwan, 2003.
    • (2003) Information Management Thesis
    • Huang, C.L.1    Tang, W.C.2
  • 4
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D. Y. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition, vol.36, pp. 229-243, 2003.
    • (2003) Pattern Recognition , vol.36 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 5
    • 37249033556 scopus 로고    scopus 로고
    • Guide of LIBSVM. http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf
    • Guide of LIBSVM
  • 6
    • 34547793690 scopus 로고    scopus 로고
    • Building intrusion pattern miner for snort network intrusion detection system
    • L. C. Wuu, C. H. Hung and S. F. Chen, Building Intrusion Pattern Miner for Snort Network Intrusion Detection System. Journal of Systems and Software, vol.80, Issue 10, pp. 1699-1715, 2007.
    • (2007) Journal of Systems and Software , vol.80 , Issue.10 , pp. 1699-1715
    • Wuu, L.C.1    Hung, C.H.2    Chen, S.F.3
  • 7
    • 70449126869 scopus 로고    scopus 로고
    • MIT
    • MIT,http://www.ll.mit.edu/IST/ideval/data/1998/1998-data-index. html, 2008.
    • (2008)
  • 8
    • 34447639073 scopus 로고    scopus 로고
    • A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
    • DOI 10.1016/j.comcom.2007.05.002, PII S0140366407001855
    • N. Toosi and M. Kahani, A New Approach to Intrusion detection based on An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers. Computer Communications, vol.30, Issue 10, pp. 2201-2212, 2007. (Pubitemid 47094963)
    • (2007) Computer Communications , vol.30 , Issue.10 , pp. 2201-2212
    • Toosi, A.N.1    Kahani, M.2
  • 9
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • O. Depren, M. Topallar, E. Anarim and M. K. Ciliz, An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks. Expert Systems with Applications, vol.29, pp. 713-722, 2005.
    • (2005) Expert Systems with Applications , vol.29 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 12
    • 57749090943 scopus 로고    scopus 로고
    • A hybrid approach of rough set theory and genetic algorithm for svm-based intrusion detection
    • Chung Hua University Taiwan
    • W. T. Wong and Y. C. Chang, A Hybrid Approach of Rough Set Theory and Genetic Algorithm for SVM-based Intrusion Detection. Information Management Thesis, Chung Hua University Taiwan, 2005.
    • (2005) Information Management Thesis
    • Wong, W.T.1    Chang, Y.C.2
  • 14
    • 21844433474 scopus 로고    scopus 로고
    • Application of online-training SVMs for real-time intrusion detection with different considerations
    • Z. Zhang and H. Shen, Application of Online-training SVMs for Real-time Intrusion Detection with Different Considerations. Computer Communications, vol.28, pp. 1428-1442, 2005.
    • (2005) Computer Communications , vol.28 , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.