메뉴 건너뛰기




Volumn , Issue , 2010, Pages

An information-theoretic combining method for multi-classifier anomaly detection systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCURACY RATE; ANOMALY DETECTION SYSTEMS; CLASSIFIER COMBINING; COMBINING METHOD; COMBINING PROCESS; COMBINING SCHEMES; COMBINING TECHNIQUES; DATA SETS; DETECTION RATES; FALSE ALARM RATE; INDIVIDUAL CLASSIFIERS; MULTI-CLASSIFIER; MULTIPLE CLASSIFIERS; NETWORK ANOMALIES; NETWORK ANOMALY DETECTION; NOVEL INFORMATION; REAL-WORLD; STANDARD DEVIATION;

EID: 77955347054     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2010.5501984     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 3
    • 51249117997 scopus 로고    scopus 로고
    • Empirical Analysis of Rate Limiting Mechanisms
    • C. Wong, S. Bielski, A. Studer, C. Wang, "Empirical Analysis of Rate Limiting Mechanisms," RAID, 2005.
    • (2005) RAID
    • Wong, C.1    Bielski, S.2    Studer, A.3    Wang, C.4
  • 5
    • 0026860706 scopus 로고
    • Methods of combining multiple classifiers and their applications to Handwriting Recognition
    • L. Xu, A. Krzyzak, C.Y. Suen, "Methods of combining multiple classifiers and their applications to Handwriting Recognition," IEEE Trans on System, Man and Cybernetics, (22)3, 1992.
    • (1992) IEEE Trans on System, Man and Cybernetics , vol.3 , Issue.22
    • Xu, L.1    Krzyzak, A.2    Suen, C.Y.3
  • 6
    • 77955354166 scopus 로고    scopus 로고
    • WiSNet LAB Dataset: http://www.wisnet.seecs.nust.edu.pk/downloads.php
    • WiSNet LAB Dataset
  • 8
    • 35348821822 scopus 로고    scopus 로고
    • Intrusion detection in computer networks by a modular ensemble of one-class classifiers
    • G. Giacinto, R. Perdisci , M. Del Rio and F. Roli, Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, (9)1:69-82, 2008.
    • (2008) Information Fusion , vol.1 , Issue.9 , pp. 69-82
    • Giacinto, G.1    Perdisci, R.2    Del Rio, M.3    Roli, F.4
  • 9
    • 0442296744 scopus 로고    scopus 로고
    • A Bayesian paradigm for designing intrusion detection systems
    • S.L. Scott, "A Bayesian paradigm for designing intrusion detection systems," Comput Stat and Data Analysis, 45(1):6983, 2004.
    • (2004) Comput Stat and Data Analysis , vol.45 , Issue.1 , pp. 6983
    • Scott, S.L.1
  • 11
    • 77955399509 scopus 로고    scopus 로고
    • Multiple Classifier Combination for Character Recognition: Revisiting the Majority Voting System and Its Variations
    • A.F.R. Rahman, H. Alam, M.C. Fairhurst, "Multiple Classifier Combination for Character Recognition: Revisiting the Majority Voting System and Its Variations," Intl Workshop on Doc Analysis Sys, 2002.
    • Intl Workshop on Doc Analysis Sys, 2002
    • Rahman, A.F.R.1    Alam, H.2    Fairhurst, M.C.3
  • 13
    • 0031100515 scopus 로고    scopus 로고
    • Exploiting second order information to design a novel multiple expert decision combination platform for pattern classification
    • A. F. R. Rahman and M. C. Fairhurst, "Exploiting second order information to design a novel multiple expert decision combination platform for pattern classification," Electronics Letters, 33(6):476477, 1997.
    • (1997) Electronics Letters , vol.33 , Issue.6 , pp. 476477
    • Rahman, A.F.R.1    Fairhurst, M.C.2
  • 14
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • M.M. Williamson, "Throttling viruses: Restricting propagation to defeat malicious mobile code," ACSAC, 2002.
    • (2002) ACSAC
    • Williamson, M.M.1
  • 16
    • 26844466732 scopus 로고    scopus 로고
    • Fast detection of scanning worm infections
    • S.E. Schechter, J. Jung, A.W. Berger, "Fast detection of scanning worm infections," RAID, 2004.
    • (2004) RAID
    • Schechter, S.E.1    Jung, J.2    Berger, A.W.3
  • 18
    • 77955365516 scopus 로고    scopus 로고
    • Network Traffic Anomaly Detection Based on Packet Bytes
    • M.V. Mahoney, P.K. Chan, "Network Traffic Anomaly Detection Based on Packet Bytes," ACM SAC, 2003.
    • (2003) ACM SAC
    • Mahoney, M.V.1    Chan, P.K.2
  • 20
    • 84878737375 scopus 로고    scopus 로고
    • Combining Filtering and Statistical methods for anomaly detection
    • A. Soule, K. Salamatian, N. Taft, "Combining Filtering and Statistical methods for anomaly detection," ACM/Usenix IMC, 2005.
    • (2005) ACM/Usenix IMC
    • Soule, A.1    Salamatian, K.2    Taft, N.3
  • 21
    • 84878701863 scopus 로고    scopus 로고
    • Detecting anomalies in network traffic using maximum entropy estimation
    • Y. Gu, A. McCullum, D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," ACM/Usenix IMC, 2005.
    • (2005) ACM/Usenix IMC
    • Gu, Y.1    McCullum, A.2    Towsley, D.3
  • 23
    • 33847256529 scopus 로고    scopus 로고
    • The Devil and Packet Trace Anonymization
    • R. Pang, M. Allman, V. Paxson, J. Lee, "The Devil and Packet Trace Anonymization," ACM CCR, 36(1), 2006.
    • (2006) ACM CCR , vol.36 , pp. 1
    • Pang, R.1    Allman, M.2    Paxson, V.3    Lee, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.