메뉴 건너뛰기




Volumn 198 CCIS, Issue , 2011, Pages 399-408

Network intrusion detection using genetic algorithm and neural network

Author keywords

Back Propagation Network; Feature Selection; Genetic Algorithm; Intrusion Detection

Indexed keywords

BACK PROPAGATION NEURAL NETWORKS; BACKPROPAGATION NETWORK; CLASSIFICATION ACCURACY; DATA SETS; DETECTION ACCURACY; FEATURE SELECTION METHODS; NETWORK INTRUSION DETECTION; NOISY DATA;

EID: 79960290786     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-22555-0_41     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 1
    • 34548613852 scopus 로고    scopus 로고
    • Network Intrusion Detection Using Wavelet Analysis
    • Das, G., Gulati, V.P. (eds.) CIT 2004. Springer, Heidelberg
    • Rawat, S., Sastry, C.S.: Network Intrusion Detection Using Wavelet Analysis. In: Das, G., Gulati, V.P. (eds.) CIT 2004. LNCS, vol. 3356, pp. 224-232. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3356 , pp. 224-232
    • Rawat, S.1    Sastry, C.S.2
  • 2
    • 33745498517 scopus 로고    scopus 로고
    • Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems
    • Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. Springer, Heidelberg
    • Guan, J., Liu, D.-x., Wang, T.: Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3045, pp. 706-714. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3045 , pp. 706-714
    • Guan, J.1    Liu, D.-X.2    Wang, T.3
  • 3
    • 26944501944 scopus 로고    scopus 로고
    • Intelligent Bayesian Classifiers in Network Intrusion Detection
    • Ali, M., Esposito, F. (eds.) IEA/AIE 2005. Springer, Heidelberg
    • Bosin, A., Dessì, N., Pes, B.: Intelligent Bayesian Classifiers in Network Intrusion Detection. In: Ali, M., Esposito, F. (eds.) IEA/AIE 2005. LNCS (LNAI), vol. 3533, pp. 445-447. Springer, Heidelberg (2005)
    • (2005) LNCS (LNAI) , vol.3533 , pp. 445-447
    • Bosin, A.1    Dessì, N.2    Pes, B.3
  • 4
    • 24944586818 scopus 로고    scopus 로고
    • Network-based intrusion detection with support vector machines
    • Kahng, H.-K. (ed.) ICOIN 2003. Springer, Heidelberg
    • Kim, D.S., Park, J.S.: Network-based intrusion detection with support vector machines. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol. 2662, pp. 747-756. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2662 , pp. 747-756
    • Kim, D.S.1    Park, J.S.2
  • 5
    • 11244287524 scopus 로고    scopus 로고
    • An intrusion detection system based on support vector machine
    • Rao, X., Dong, C.-x., Yang, S.-q.: An intrusion detection system based on support vector machine. Journal of Software 4, 798-803 (2003)
    • (2003) Journal of Software , vol.4 , pp. 798-803
    • Rao, X.1    Dong, C.-X.2    Yang, S.-Q.3
  • 6
    • 70449445893 scopus 로고    scopus 로고
    • Application of support vector machines on network abnormal intrusion detection
    • Zhang, K., Cao, H.-x., Yan, H.: Application of support vector machines on network abnormal intrusion detection. Application Research of Computers 5, 98-100 (2006)
    • (2006) Application Research of Computers , vol.5 , pp. 98-100
    • Zhang, K.1    Cao, H.-X.2    Yan, H.3
  • 8
    • 79960299968 scopus 로고    scopus 로고
    • KDD Cup99 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
    • KDD Cup99 Data
  • 9
    • 85132011160 scopus 로고
    • An application of a recurrent network to an Intrusion Detection System
    • Debar, H., Dorizzi, B.: An application of a recurrent network to an Intrusion Detection System. In: Proceedings of IJCNN, pp. 78-83 (1992)
    • (1992) Proceedings of IJCNN , pp. 78-83
    • Debar, H.1    Dorizzi, B.2
  • 17
    • 21844433474 scopus 로고    scopus 로고
    • Application of Online training SVM for real time intrusion detection
    • Zhang, Z., Shen, H.: Application of Online training SVM for real time intrusion detection. Computer Communications 28, 14281442 (2005)
    • (2005) Computer Communications , vol.28 , pp. 14281442
    • Zhang, Z.1    Shen, H.2
  • 20
    • 77954310491 scopus 로고    scopus 로고
    • Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
    • August
    • El-Khatib, K.: Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems. IEEE Transactions on Parallel And Distributed Systems 21(8) (August 2010)
    • (2010) IEEE Transactions on Parallel and Distributed Systems , vol.21 , Issue.8
    • El-Khatib, K.1
  • 25
    • 79960293482 scopus 로고    scopus 로고
    • Classification of Heart Diseases in Ultrasonic Images Using Neural Networks
    • Classification Of Heart Diseases In Ultrasonic Images Using Neural Networks, E D By Genetic Algorithms Proceedings of Xsp 1998 (1998)
    • (1998) E D by Genetic Algorithms Proceedings of Xsp 1998


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.