메뉴 건너뛰기




Volumn 5, Issue 1, 2010, Pages 23-31

Anomaly network intrusion detection based on improved self adaptive Bayesian algorithm

Author keywords

Alert classification; Anomaly detection; Bayesian algorithm; Detection rate; False positives; Network intrusion detection

Indexed keywords

ALERT CLASSIFICATION; ANOMALY DETECTION; BAYESIAN ALGORITHMS; DETECTION RATES; FALSE POSITIVE; NETWORK INTRUSION DETECTION;

EID: 78651535903     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.5.1.23-31     Document Type: Article
Times cited : (46)

References (42)
  • 4
    • 34447129541 scopus 로고    scopus 로고
    • An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm
    • June
    • Yu Y, and Huang Hao, "An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm," Journal of Software, Vol.18, No.6, June 2007, pp.1369-1378.
    • (2007) Journal of Software , vol.18 , Issue.6 , pp. 1369-1378
    • Yu, Y.1    Hao, H.2
  • 5
    • 0034247240 scopus 로고    scopus 로고
    • Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    • J. Luo, and S. M. Bridges, "Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection," International Journal of Intelligent Systems, 2000, pp. 687-703.
    • (2000) International Journal of Intelligent Systems , pp. 687-703
    • Luo, J.1    Bridges, S.M.2
  • 6
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection model
    • Oakland, CA: IEEE Computer Society Press
    • W.K. Lee, and S. J. Stolfo, "A data mining framework for building intrusion detection model," Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1999, pp. 120-132.
    • (1999) Proceedings of the IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.K.1    Stolfo, S.J.2
  • 14
    • 1842709394 scopus 로고
    • IDES: An Intelligent System for Detecting Intruders
    • Threats, and Countermeasures; Rome, Italy, November 22-23
    • Teresa F. Lunt, "IDES: An Intelligent System for Detecting Intruders," Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, Italy, November 22-23, 1090, pp.110-121.
    • (1090) Proceedings of the Symposium on Computer Security , pp. 110-121
    • Lunt, T.F.1
  • 15
    • 85137333645 scopus 로고    scopus 로고
    • Adaptive Real-time Anomaly Detection using Inductively Generated Sequential Patterns
    • Oakland, CA
    • Teng, Henry S., Chen, Kaihu, and Lu, Stephen C-Y, "Adaptive Real-time Anomaly Detection using Inductively Generated Sequential Patterns," 1990 IEEE Symposium on Recearch in Security and Privacy, Oakland, CA, pp. 296-304.
    • 1990 IEEE Symposium on Recearch in Security and Privacy , pp. 296-304
    • Teng, H.S.1    Chen, K.2    Lu, S.C.-Y.3
  • 18
    • 78651582469 scopus 로고
    • Conference on Auditing and Computer Technology, SRI International
    • Teresa F. Lunt, "Detecting Intrusion in Computer Systems," 1993 Conference on Auditing and Computer Technology, SRI International.
    • (1993) Detecting Intrusion in Computer Systems
    • Lunt, T.F.1
  • 22
    • 33645756878 scopus 로고    scopus 로고
    • The use of honeynets to increase computer network security and user awareness
    • Krasser, S., Grizzard, J., Owen, H., and Levine J., "The use of honeynets to increase computer network security and user awareness," Journal of Security Education, Volume 1, pp. 23-37, 2005.
    • (2005) Journal of Security Education , vol.1 , pp. 23-37
    • Krasser, S.1    Grizzard, J.2    Owen, H.3    Levine, J.4
  • 24
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral model
    • D.Y. Yeung, and Y.X. Ding, "Host-based intrusion detection using dynamic and static behavioral model", Pattern Recognition, 36, pp. 229-243, 2003.
    • (2003) Pattern Recognition , vol.36 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.X.2
  • 29
    • 33744584654 scopus 로고
    • Induction of Decision Tree
    • J. R. Quinlan, "Induction of Decision Tree," Machine Learning Vol. 1, pp. 81-106, 1986.
    • (1986) Machine Learning , vol.1 , pp. 81-106
    • Quinlan, J.R.1
  • 33
    • 0000865580 scopus 로고
    • Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm
    • D. Turney, "Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm," Journal of Artificial Intelligence Research, pp. 369-409, 1995.
    • (1995) Journal of Artificial Intelligence Research , pp. 369-409
    • Turney, D.1
  • 39
    • 34147192817 scopus 로고    scopus 로고
    • The KDD Archive
    • The KDD Archive. KDD99 cup dataset. 1999. http://archive.ics.uci.edu/ml/datasets/KDD+Cup+1999+Data
    • (1999) KDD99 cup dataset
  • 41
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • Chebrolu S, Abraham A, and Thomas JP, "Feature deduction and ensemble design of intrusion detection systems." Computer & Security, 2004, 24(4), pp. 295-307.
    • (2004) Computer & Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.