메뉴 건너뛰기




Volumn 38, Issue 6, 2011, Pages 7698-7707

Incremental SVM based on reserved set for network intrusion detection

Author keywords

Incremental support vector machine; Modified kernel function; Network intrusion detection; Reserved set

Indexed keywords

ACADEMIC RESEARCH; COMPUTATION PROCESS; CONCENTRIC CIRCLES; INCREMENTAL SUPPORT VECTOR MACHINE; KERNEL FUNCTION; LEARNING PROCESS; MEAN SQUARE DIFFERENCE; MODIFIED KERNELS; NETWORK INTRUSION DETECTION; OSCILLATION PHENOMENON; OSCILLATION PROBLEMS; RESERVED SET; SUPPORT VECTOR; SVM ALGORITHM; TRAINING TIME;

EID: 79951581599     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2010.12.141     Document Type: Article
Times cited : (103)

References (17)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • Fort Washington, PA, USA: James P Anderson Co.
    • Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical Report, 98 (17). Fort Washington, PA, USA: James P Anderson Co.
    • (1980) Technical Report , vol.98 , Issue.17
    • Anderson, J.P.1
  • 2
    • 34249731961 scopus 로고    scopus 로고
    • Adaptive real-time anomaly detection with incremental clustering
    • DOI 10.1016/j.istr.2007.02.004, PII S1363412707000064
    • K. Burbeck, and N.T. Simmin Adaptive real-time anomaly detection with incremental clustering Information Security Technical Report 12 1 2007 56 67 (Pubitemid 46829996)
    • (2007) Information Security Technical Report , vol.12 , Issue.1 , pp. 56-67
    • Burbeck, K.1    Nadjm-Tehrani, S.2
  • 3
    • 0003893616 scopus 로고
    • Requirements and model for IDES-A real-time intrusion detection system
    • Computer Science Laboratory. Menlo Park, CA: SRI International.
    • Denning, D. E.; Neumann, P. G. (1985). Requirements and model for IDES-A real-time intrusion detection system. Technical Report, Computer Science Laboratory. Menlo Park, CA: SRI International.
    • (1985) Technical Report
    • Denning, D.E.1    Neumann, P.G.2
  • 7
    • 79951579022 scopus 로고    scopus 로고
    • KDD99, KDD cup 1999 data. (1999).
    • KDD99, KDD cup 1999 data. (1999). .
  • 9
    • 33645163913 scopus 로고    scopus 로고
    • Dos intrusion detection based on incremental learning with support vector machines
    • Y. Liu, Z. Wang, Y. Feng, and H.Y. Gu Dos intrusion detection based on incremental learning with support vector machines Computer Engineering 32 4 2006 179 186
    • (2006) Computer Engineering , vol.32 , Issue.4 , pp. 179-186
    • Liu, Y.1    Wang, Z.2    Feng, Y.3    Gu, H.Y.4
  • 10
    • 34447280122 scopus 로고    scopus 로고
    • Network anomaly detection with incomplete audit data
    • DOI 10.1016/j.comnet.2007.04.017, PII S1389128607001235
    • A. Patcha, and J.M. Park Network anomaly detection with incomplete audit data Computer Networks 51 13 2007 3935 3955 (Pubitemid 47042596)
    • (2007) Computer Networks , vol.51 , Issue.13 , pp. 3935-3955
    • Patcha, A.1    Park, J.-M.2
  • 11
    • 33750514606 scopus 로고    scopus 로고
    • Modeling intrusion detection system using hybrid intelligent systems
    • DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
    • S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas Modeling intrusion detection system using hybrid intelligent systems Journal of Network and Computer Applications 30 1 2007 114 132 (Pubitemid 44666486)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 114-132
    • Peddabachigari, S.1    Abraham, A.2    Grosan, C.3    Thomas, J.4
  • 13
    • 34548793095 scopus 로고    scopus 로고
    • Intrusion detection model based on particle swarm optimization and support vector machine
    • DOI 10.1109/CISDA.2007.368152, 4219099, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007
    • Srinoy, S. (2007). Intrusion Detection model based on particle swarm optimization and support vector machine. In Proceedings of the 2007 IEEE symposium on computational intelligence in security and defense applications (CISDA 2007) (pp. 186-192). (Pubitemid 47431354)
    • (2007) Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007 , pp. 186-192
    • Srinoy, S.1
  • 15
    • 78149367754 scopus 로고    scopus 로고
    • New algorithm for SVM-based incremental learning
    • X.D. Wang, C.Y. Zheng, C.M. Wu, and H.D. Zhang New algorithm for SVM-based incremental learning Computer Applications 26 10 2006 2440 2443
    • (2006) Computer Applications , vol.26 , Issue.10 , pp. 2440-2443
    • Wang, X.D.1    Zheng, C.Y.2    Wu, C.M.3    Zhang, H.D.4
  • 16
    • 40849099949 scopus 로고    scopus 로고
    • Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
    • C. Xiang, P.C. Yong, and L.S. Meng Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees Pattern Recognition Letters 29 7 2008 918 924
    • (2008) Pattern Recognition Letters , vol.29 , Issue.7 , pp. 918-924
    • Xiang, C.1    Yong, P.C.2    Meng, L.S.3
  • 17
    • 21844433474 scopus 로고    scopus 로고
    • Application of online-training SVMs for real-time intrusion detection with different considerations
    • DOI 10.1016/j.comcom.2005.01.014, PII S0140366405000484
    • Z. Zhang, and H. Shen Application of online-training SVMs for real-time intrusion detection with different considerations Computer Communications 28 12 2005 1428 1442 (Pubitemid 40952614)
    • (2005) Computer Communications , vol.28 , Issue.12 , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.