메뉴 건너뛰기




Volumn 3, Issue 4, 2011, Pages 132-140

Network intrusion detection based on improved proximal SVM

Author keywords

Intrusion detection; Kernel function; Network flow; Proximal SVM

Indexed keywords

COMPUTATIONAL TIME; DETECTION PERFORMANCE; KERNEL FUNCTION; NETWORK ENVIRONMENTS; NETWORK FLOW; NETWORK INTRUSION DETECTION; NETWORK INTRUSIONS; PROXIMAL SVM; SECURITY INFRASTRUCTURE; SVM ALGORITHM; TRAINING TIME;

EID: 79958850284     PISSN: 19763700     EISSN: None     Source Type: Journal    
DOI: 10.4156/aiss.vol3.issue4.16     Document Type: Article
Times cited : (19)

References (21)
  • 4
    • 78651563693 scopus 로고    scopus 로고
    • An intelligent distributed intrusion detection system using genetic algorithm
    • Janakiraman S, Vasudevan V. An intelligent distributed intrusion detection system using genetic algorithm, Journal of Convergence Information Technology, vol. 4, no. 1, pp. 70-76, 2009.
    • (2009) Journal of Convergence Information Technology , vol.4 , Issue.1 , pp. 70-76
    • Janakiraman, S.1    Vasudevan, V.2
  • 5
    • 78651547976 scopus 로고    scopus 로고
    • Anomaly detection analysis of intrusion data ising supervised & unsupervised approach
    • Prasanta G, Borah B, Bhattacharyya D. Anomaly detection analysis of intrusion data ising supervised & unsupervised approach, Journal of Convergence Information Technology, vol. 5, no. 1, pp. 95-110, 2010.
    • (2010) Journal of Convergence Information Technology , vol.5 , Issue.1 , pp. 95-110
    • Prasanta, G.1    Borah, B.2    Bhattacharyya, D.3
  • 8
    • 21844433474 scopus 로고    scopus 로고
    • Application of online-training SVMs for real-time intrusion detection with different considerations
    • Zhang Z, Shen H. Application of online-training SVMs for real-time intrusion detection with different considerations, Computer Communications, vol. 28, no.12, pp. 1428-1442, 2005.
    • (2005) Computer Communications , vol.28 , Issue.12 , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2
  • 10
    • 78149465598 scopus 로고    scopus 로고
    • Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
    • Su Ming-Yang. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, vol. 34, no. 1, pp. 107-117, 2011.
    • (2011) Computer Communications , vol.34 , Issue.1 , pp. 107-117
    • Ming-Yang, S.1
  • 11
    • 77956395448 scopus 로고    scopus 로고
    • Efficient hardware support for pattern matching in network intrusion detection
    • Guinde Nitesh, Ziavras Sotirios. Efficient hardware support for pattern matching in network intrusion detection. Computers and Security, vol. 29, no. 7, pp. 756-769, 2010.
    • (2010) Computers and Security , vol.29 , Issue.7 , pp. 756-769
    • Nitesh, G.1    Sotirios, Z.2
  • 12
    • 78650662129 scopus 로고    scopus 로고
    • Enhancing intrusion detection system with proximity information
    • Zhuang Zhenyun, Li Ying, Chen, Zesheng. Enhancing intrusion detection system with proximity information. International Journal of Security and Networks, vol. 5, no. 4, pp. 207-219, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 7-219
    • Zhenyun, Z.1    Li, Y.2    Chen, Z.3
  • 13
    • 77950298520 scopus 로고    scopus 로고
    • Anomaly intrusion detection by clustering transactional audit streams in a host computer
    • Park Nam, Sang Hyun, Lee Won. Anomaly intrusion detection by clustering transactional audit streams in a host computer. Information Sciences, vol. 180, no. 12, pp. 2375-2389, 2010.
    • (2010) Information Sciences , vol.180 , Issue.12 , pp. 2375-2389
    • Nam, P.1    Hyun, S.2    Won, L.3
  • 14
    • 79951793502 scopus 로고    scopus 로고
    • Hybrid pattern matching for trusted intrusion detection
    • Soewito Benfano, Vespa Lucas, Weng Ning. Hybrid pattern matching for trusted intrusion detection. Security and Communication Networks, vol. 4, no. 1, pp. 33-43, 2011.
    • (2011) Security and Communication Networks , vol.4 , Issue.1 , pp. 33-43
    • Benfano, S.1    Lucas, V.2    Ning, W.3
  • 15
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • Zhou Chenfeng, Leckie Christopher, Karunasekera Shanika. A survey of coordinated attacks and collaborative intrusion detection. Computers and Security, vol. 29, no. 1, pp. 124-140, 2010.
    • (2010) Computers and Security , vol.29 , Issue.1 , pp. 124-140
    • Chenfeng, Z.1    Christopher, L.2    Shanika, K.3
  • 18
    • 0242468747 scopus 로고    scopus 로고
    • An anomaly intrusion detection method by clustering normal user behavior
    • Sang H, Won S. An anomaly intrusion detection method by clustering normal user behavior. Computers and Security. vol.22, no.7, pp. 596-612, 2003.
    • (2003) Computers and Security , vol.22 , Issue.7 , pp. 596-612
    • Sang, H.1    Won, S.2
  • 19
    • 33745243253 scopus 로고    scopus 로고
    • Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies
    • Jing J, Papavassiliou S. Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies. Computer Communications, vol.29, no. 10, pp. 1627-1638, 2006.
    • (2006) Computer Communications , vol.29 , Issue.10 , pp. 1627-1638
    • Jing, J.1    Papavassiliou, S.2
  • 21
    • 33750079864 scopus 로고    scopus 로고
    • A hierarchy of support vector machines for pattern detection
    • Sahbi Hichem, Geman Donald. A hierarchy of support vector machines for pattern detection. Journal of Machine Learning Research, vol. 7, no. 10, pp. 2087-2123, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , Issue.10 , pp. 2087-2123
    • Hichem, S.1    Donald, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.