메뉴 건너뛰기




Volumn 21, Issue 2, 2008, Pages 101-115

Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree

Author keywords

Data mining; Decision tree; False negative; False positive; Intrusion detection; Rule based

Indexed keywords


EID: 70449353683     PISSN: 01279084     EISSN: None     Source Type: Journal    
DOI: 10.22452/mjcs.vol21no2.3     Document Type: Article
Times cited : (55)

References (15)
  • 1
    • 70449425022 scopus 로고    scopus 로고
    • Classification and Clustering for Knowledge Discovery, Saman Halgamuge and Lipo Wang (Eds.), Studies in Computational Intelligence, Springer Verlag Germany, ISBN: 3-540-26073-0, Chapter 13
    • Ajith Abraham, Ravi. Jain, Soft Computing Models for Network Intrusion Detection Systems. Classification and Clustering for Knowledge Discovery, Saman Halgamuge and Lipo Wang (Eds.), Studies in Computational Intelligence, Vol. 4, Springer Verlag Germany, 2005, ISBN: 3-540-26073-0, Chapter 13, pp. 187-204.
    • (2005) Soft Computing Models for Network Intrusion Detection Systems , vol.4 , pp. 187-204
    • Abraham, A.1    Jain, R.2
  • 4
    • 70449414947 scopus 로고    scopus 로고
    • CA: University of California, Irvine, KDD Cup 1999 Data, 5th International Conference on Knowledge Discovery and Data Mining
    • Hettich, S. and Bay, S. D., The UCI KDD Archive Irvine, CA: University of California, Irvine, KDD Cup 1999 Data, 5th International Conference on Knowledge Discovery and Data Mining, 1999.
    • (1999) The UCI KDD Archive Irvine
    • Hettich, S.1    Bay, S.D.2
  • 6
    • 70449420364 scopus 로고    scopus 로고
    • Malaysian Computer Emergency Response Team (MyCERT), [Last visit: 05-12-2007]
    • Malaysian Computer Emergency Response Team (MyCERT), 2007 http://www.mycert.org.my [Last visit: 05-12-2007].
    • (2007)
  • 7
    • 70449454263 scopus 로고
    • Network Security
    • Moulton, R.T., "Network Security", Datamation, Vol.29, No.7, 1983, pp.121-127.
    • (1983) Datamation , vol.29 , Issue.7 , pp. 121-127
    • Moulton, R.T.1
  • 8
    • 70449443532 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory, DARPA Intrusion Detection Evaluation. [Internet] [Last visit: 06-12-2007]
    • MIT Lincoln Laboratory, DARPA Intrusion Detection Evaluation. [Internet] http://www.ll.mit.edu/IST/ideval [Last visit: 06-12-2007].
  • 9
    • 18144408149 scopus 로고    scopus 로고
    • Stanford University. [Internet] [Last visit: 05-12-2007]
    • Nilsson, N., Introduction to Machine Learning. Stanford University, 1996. [Internet] http://ai.stanford.edu/~nilsson/MLDraftBook/MLBOOK.pdf. [Last visit: 05-12-2007].
    • (1996) Introduction to Machine Learning
    • Nilsson, N.1
  • 10
    • 2642515264 scopus 로고    scopus 로고
    • Rebecca Base and Peter Mell, Infidel, Inc., Scotts Valley, CA and National Institute of Standards and Technology
    • Rebecca Base and Peter Mell, NIST Special Publication on Intrusion Detection Systems. Infidel, Inc., Scotts Valley, CA and National Institute of Standards and Technology, 2001.
    • (2001) NIST Special Publication on Intrusion Detection Systems
  • 12
    • 70449454265 scopus 로고    scopus 로고
    • RuleQuest, [Internet] [Last visit 06-12-2007]
    • RuleQuest, (2007) [Internet] http://www.RuleQuest.com [Last visit 06-12-2007].
    • (2007)
  • 13
    • 70449444565 scopus 로고    scopus 로고
    • Securityfocus, [Internet] [Last visit: 16-1-2008]
    • Securityfocus, (2007). [Internet] http://www.securityfocus.com/infocus/1463 [Last visit: 16-1-2008].
    • (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.