메뉴 건너뛰기




Volumn 11, Issue 2, 2010, Pages 131-146

An ensemble-based evolutionary framework for coping with distributed intrusion detection

Author keywords

Distributed evolutionary algorithms; Ensemble classifiers; Intrusion detection

Indexed keywords

ABNORMAL BEHAVIOR; DETECTION ACCURACY; DISTRIBUTED DATA; DISTRIBUTED DATA MINING; DISTRIBUTED EVOLUTIONARY ALGORITHMS; DISTRIBUTED INTRUSION DETECTION; ENSEMBLE CLASSIFIERS; EVOLUTIONARY FRAMEWORK; NETWORK ACTIVITIES;

EID: 77954816351     PISSN: 13892576     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10710-010-9101-6     Document Type: Article
Times cited : (29)

References (30)
  • 1
    • 39049157381 scopus 로고    scopus 로고
    • Evolutionary design of intrusion detection programs
    • A. Abraham, C. Grosan, C. Martin-Vide, Evolutionary design of intrusion detection programs. Int. J. Netw. Secur. 4(3), 328-339 (2007)
    • (2007) Int. J. Netw. Secur. , vol.4 , Issue.3 , pp. 328-339
    • Abraham, A.1    Grosan, C.2    Martin-Vide, C.3
  • 2
    • 0036808672 scopus 로고    scopus 로고
    • Parallelism and evolutionary algorithms
    • E. Alba, M. Tomassini, Parallelism and evolutionary algorithms. IEEE Trans. Evol. Comput. 6(5), 443-462 (2002)
    • (2002) IEEE Trans. Evol. Comput. , vol.6 , Issue.5 , pp. 443-462
    • Alba, E.1    Tomassini, M.2
  • 4
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the roc curve in the evaluation of machine learning algorithms
    • A.P. Bradley, The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognit. 30(7), 1145-1159 (1997)
    • (1997) Pattern Recognit. , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.P.1
  • 9
    • 55349133200 scopus 로고    scopus 로고
    • Genetic programming approach for multi-category pattern classification applied to network intrusions detection
    • K. Faraoun, A. Boukelif, Genetic programming approach for multi-category pattern classification applied to network intrusions detection. Int. J. Comput. Intell. Appl. 6(1), 77-99 (2006)
    • (2006) Int. J. Comput. Intell. Appl. , vol.6 , Issue.1 , pp. 77-99
    • Faraoun, K.1    Boukelif, A.2
  • 10
    • 0037297960 scopus 로고    scopus 로고
    • A scalable cellular implementation of parallel genetic programming
    • G. Folino, C. Pizzuti, G. Spezzano, A scalable cellular implementation of parallel genetic programming. IEEE Trans. Evol. Comput. 7(1), 37-53 (2003)
    • (2003) IEEE Trans. Evol. Comput. , vol.7 , Issue.1 , pp. 37-53
    • Folino, G.1    Pizzuti, C.2    Spezzano, G.3
  • 12
    • 33749865403 scopus 로고    scopus 로고
    • GP ensembles for large scale data classification
    • G. Folino, C. Pizzuti, G. Spezzano, GP ensembles for large scale data classification. IEEE Trans. Evol. Comput. 10(5), 604-616 (2006)
    • (2006) IEEE Trans. Evol. Comput. , vol.10 , Issue.5 , pp. 604-616
    • Folino, G.1    Pizzuti, C.2    Spezzano, G.3
  • 14
    • 34547798962 scopus 로고    scopus 로고
    • Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
    • J.V. Hansen, P.B. Lowry, R.D. Meservy, D.M. McDonald, Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decis. Support Syst. 43(4), 1362-1374 (2007)
    • (2007) Decis. Support Syst. , vol.43 , Issue.4 , pp. 1362-1374
    • Hansen, J.V.1    Lowry, P.B.2    Meservy, R.D.3    McDonald, D.M.4
  • 19
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1988 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh, Testing intrusion detection systems: a critique of the 1988 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262-294 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 22
    • 33750514606 scopus 로고    scopus 로고
    • Modeling intrusion detection system using hybrid intelligent systems
    • DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
    • S. Peddabachigari, A. Abraham, C. Grosan, J. Thomas, Modeling intrusion detection system using hybrid intelligent systems. Int. J. Netw. Comput. Appl. 30, 114-132 (2007) (Pubitemid 44666486)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 114-132
    • Peddabachigari, S.1    Abraham, A.2    Grosan, C.3    Thomas, J.4
  • 25
    • 0025448521 scopus 로고
    • The strength of weak learnability
    • R.E. Schapire, The strength of weak learnability. Mach. Learn. 5(2), 197-227 (1990)
    • (1990) Mach. Learn. , vol.5 , Issue.2 , pp. 197-227
    • Schapire, R.E.1
  • 26
    • 0002978642 scopus 로고    scopus 로고
    • Boosting a weak learning by maiority
    • R.E. Schapire, Boosting a weak learning by maiority. Inf. Comput. 121(2), 256-285 (1996)
    • (1996) Inf. Comput. , vol.121 , Issue.2 , pp. 256-285
    • Schapire, R.E.1
  • 28
    • 21044433766 scopus 로고    scopus 로고
    • Training genetic programming on half a millio patterns: An example from anomaly detection
    • D. Song, M.I. Heywood, A.N. Zincir-Heywood, Training genetic programming on half a millio patterns: An example from anomaly detection. IEEE Trans. Evol. Comput. 9(3), 225-239 (2005)
    • (2005) IEEE Trans. Evol. Comput. , vol.9 , Issue.3 , pp. 225-239
    • Song, D.1    Heywood, M.I.2    Zincir-Heywood, A.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.