메뉴 건너뛰기




Volumn , Issue , 2011, Pages 662-668

Binary PSO and random forests algorithm for PROBE attacks detection in a network

Author keywords

Intrusion Detection; Particle Swarm Optimization; PROBE attacks; Random Forests

Indexed keywords

BINARY PARTICLE SWARM OPTIMIZATION; BINARY PSO; CLASSIFICATION TECHNIQUE; DATA SETS; GLOBAL SEARCH CAPABILITY; HYBRID CLASSIFIER; NETWORK ATTACK; NETWORK INTRUSION DETECTION; OPTIMIZATION METHOD; PARTICLE SWARM; RANDOM FORESTS; VARIOUS ATTACKS;

EID: 80051998644     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CEC.2011.5949682     Document Type: Conference Paper
Times cited : (40)

References (21)
  • 1
    • 77951619009 scopus 로고    scopus 로고
    • Compatibility as a heuristic for construction of rules by artificial ants
    • Feb
    • Waseem Shahzad, Abdul Rauf Baig, "Compatibility As a Heuristic For Construction Of Rules By Artificial Ants", Journal of Circuits, Systems, and Computers, vol. 19, no. 1, pp. 297-306, Feb. 2010.
    • (2010) Journal of Circuits, Systems, and Computers , vol.19 , Issue.1 , pp. 297-306
    • Shahzad, W.1    Baig, A.R.2
  • 5
    • 80052008269 scopus 로고    scopus 로고
    • Irvine, CA, USA
    • KDD'99 datasets, The UCI KDD Archive, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html, Irvine, CA, USA, 1999.
    • (1999) KDD'99 Datasets, the UCI KDD Archive
  • 6
    • 16244370106 scopus 로고    scopus 로고
    • Robust prediction of fault-proneness by random forests
    • ISSRE 2004 Proceedings; 15th International Symposium on Software Reliability Engineering
    • Lan Guo, Yan Ma, Bojan Cukic, and Harshinder Singh, "Robust Prediction of Fault-Proneness by Random Forests", Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04), pp. 417-428, Brittany, France, November 2004. (Pubitemid 40455712)
    • (2004) Proceedings - International Symposium on Software Reliability Engineering, ISSRE , pp. 417-428
    • Guo, L.1    Ma, Y.2    Cukic, B.3    Singh, H.4
  • 8
    • 10844237614 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/lincoln laboratory evaluation data for network anomaly detection
    • Pittsburgh, USA, September
    • M. Mahoney and P. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection", Proceeding of Recent Advances in Intrusion Detection (RAID)-2003, Pittsburgh, USA, September 2003.
    • (2003) Proceeding of Recent Advances in Intrusion Detection (RAID)-2003
    • Mahoney, M.1    Chan, P.2
  • 10
    • 72449131513 scopus 로고    scopus 로고
    • From feature selection to building of Bayesian classifiers: A network intrusion detection perspective
    • Kok-Chin Khor, Choo-Yee Ting, Somnuk-Phon Amnuaisuk, "From feature selection to building of Bayesian classifiers: a network intrusion detection perspective", American Journal of Applied Sciences, 6 (11), pp. 1949-1960, 2009
    • (2009) American Journal of Applied Sciences , vol.6 , Issue.11 , pp. 1949-1960
    • Khor, K.1    Ting, C.2    Amnuaisuk, S.3
  • 12
    • 24944552355 scopus 로고    scopus 로고
    • Feature selection and intrusion detection using hybrid flexible neural tree
    • Advances in Neural Networks - ISNN 2005: Second International Symposium on Neural Networks. Proceedings
    • Yuehui Chen, Ajith Abraham and Ju Yang, "Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree", International Symposium on Neural Networks (ISNN 2005) LNCS 3498, pp. 439-444, 2005. (Pubitemid 41315125)
    • (2005) Lecture Notes in Computer Science , vol.3498 , Issue.3 , pp. 439-444
    • Chen, Y.1    Abraham, A.2    Yang, J.3
  • 13
    • 63749120226 scopus 로고    scopus 로고
    • Network intrusion detection design using feature selection of soft computing paradigms
    • October 31
    • T. S. Chou, K. K. Yen, and J. Luo, "Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms", International Journal of Computational Intelligence, Page (s): 196-208, October 31, 2007.
    • (2007) International Journal of Computational Intelligence , pp. 196-208
    • Chou, T.S.1    Yen, K.K.2    Luo, J.3
  • 14
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • DOI 10.1016/j.cose.2004.09.008, PII S016740480400238X
    • Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas, "Feature Deduction and Ensemble Design of Intrusion Detection Systems", Computers & Security, Vol. 24, Issue 4, June 2005, Pages 295-307 (Pubitemid 40752313)
    • (2005) Computers and Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 16
    • 80052007239 scopus 로고    scopus 로고
    • PSO overview http://www.swarmintelligence.org/
    • PSO Overview
  • 17
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • DOI 10.1023/A:1010933404324
    • Leo Breiman, "Random Forests", Machine Learning, Vol. 45 Issue 1, pp. 5-32, 2001, Kluwer Academic Publishers. (Pubitemid 32933532)
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 18
    • 80051954981 scopus 로고    scopus 로고
    • http://www.stat.berkeley.edu/~breiman/RandomForests/cc-home.htm
  • 20
    • 80051959503 scopus 로고    scopus 로고
    • http://www.cs.waikato.ac.nz/ml/weka/index.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.