메뉴 건너뛰기




Volumn 19, Issue 1, 2010, Pages 22-35

Critical study of supervised learning techniques in predicting attacks

Author keywords

Bayesian networks; Classification trees; Data mining; Intrusion detection systems; Learning rules; Misuse intrusion detection

Indexed keywords

CLASSIFICATION AND REGRESSION TREE; CLASSIFICATION TREES; DATA SETS; INTRUSION DETECTION SYSTEMS; LEARNING RULES; MACHINE LEARNING METHODS; MISUSE INTRUSION; MULTINOMIAL LOGISTIC REGRESSION; PREDICTING ATTACKS; PREDICTION MODEL; RULE BASED ALGORITHMS;

EID: 79952952185     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393550903551231     Document Type: Article
Times cited : (7)

References (22)
  • 1
    • 61849175333 scopus 로고    scopus 로고
    • Efficient deterministic method for detecting new U2R attacks
    • DOI 10.1016/j.comcom.2008.12.037
    • Beghdad, R.(2009). Efficient deterministic method for detecting new U2R attacks. Computer Communications, 32(6), 1104-1110. DOI 10.1016/j.comcom.2008.12.037
    • (2009) Computer Communications , vol.32 , Issue.6 , pp. 1104-1110
    • Beghdad, R.1
  • 2
    • 53049099150 scopus 로고    scopus 로고
    • Critical study of neural networks in detecting intrusions
    • October
    • Beghdad, R.(2008, October). Critical study of neural networks in detecting intrusions. Computers & Security, 27(5-6), 168-175
    • (2008) Computers & Security , vol.27 , Issue.5-6 , pp. 168-175
    • Beghdad, R.1
  • 3
    • 10644257876 scopus 로고    scopus 로고
    • Modelling and solving the intrusion detection problem in computer networks
    • Beghdad, R.(2004). Modelling and solving the intrusion detection problem in computer networks. Computers & Security, 23(8), 687-696
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 687-696
    • Beghdad, R.1
  • 7
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • Chebrolu, S., Abraham, A., and Thomas, J. P.(2005). Feature deduction and ensemble design of intrusion detection systems. Journal of Computers and Security, 24(4), 295-307
    • (2005) Journal of Computers and Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 8
    • 85015191605 scopus 로고
    • Rule induction with CN2: Some recent improvements
    • In Y. Kodratoff (Ed.), (EWSL-91), Berlin: Springer-Verlag
    • Clark, P.(1991). Rule induction with CN2: some recent improvements. In Y. Kodratoff (Ed.), Machine Learning - Proceedings of the Fifth European Conference (EWSL-91), pp. 151-163. Berlin: Springer-Verlag
    • (1991) Machine Learning - Proceedings of the Fifth European Conference , pp. 151-163
    • Clark, P.1
  • 9
    • 34249966007 scopus 로고
    • The CN2 induction algorithm
    • Clark, P. and Niblett, T.(1989). The CN2 induction algorithm. Machine Learning Journal, 3(4), 261-283
    • (1989) Machine Learning Journal , vol.3 , Issue.4 , pp. 261-283
    • Clark, P.1    Niblett, T.2
  • 13
    • 79960678900 scopus 로고    scopus 로고
    • KDD Data Set Retrieved October 2008 from
    • KDD Data Set.(1999). Retrieved October 2008 from http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
    • (1999)
  • 15
    • 35248819234 scopus 로고    scopus 로고
    • Using decision trees to improve signaturebased intrusion detection
    • Pittsburgh, PA 8-10, September
    • Kruegel, C. and Toth, T.(2003). Using decision trees to improve signaturebased intrusion detection. In Proceeding of 6th International Symposium, RAID 2003, September 8-10, Pittsburgh, PA, pp. 173-191
    • (2003) Proceeding of 6th International Symposium, RAID 2003 , pp. 173-191
    • Kruegel, C.1    Toth, T.2
  • 19
    • 79960662758 scopus 로고    scopus 로고
    • Intrusion detection systems using decision trees and support vector machines
    • Department of Computer Science, Oklahoma State University
    • Peddabachigari, S., Abraham, A., and Thomas, J.(2003). Intrusion detection systems using decision trees and support vector machines. Technica l Report, Department of Computer Science, Oklahoma State University
    • (2003) Technica L Report
    • Peddabachigari, S.1    Abraham, A.2    Thomas, J.3
  • 20
    • 33744584654 scopus 로고
    • Induction of decision trees
    • Quinlan, J. R (1986). Induction of decision trees. Machine Learning, 1, 1-106
    • (1986) Machine Learning , vol.1 , pp. 1-106
    • Quinlan, J.R.1
  • 22
    • 33749469755 scopus 로고    scopus 로고
    • Tanagra: A Free Software For Training and Research
    • Winning Strategy in KDD99. Available from
    • Rakotomalala, R.(2005). Tanagra: a free software for training and research. Actes de EGC'2005, RNTI-E-3, 2, 697-702. Winning Strategy in KDD99. (1999). Available from: http://kdd.ccs.uci.edu/databases/kddcup99/task.html
    • (1999) Actes de EGC'2005, RNTI-E-3 , vol.2 , pp. 697-702
    • Rakotomalala, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.