메뉴 건너뛰기




Volumn 7, Issue 8, 2011, Pages 4779-4788

Efficient context-free grammar intrusion detection system

Author keywords

Grammar rule; Intrusion detection system; Network security

Indexed keywords

ALARM RATE; BENCHMARK DATABASE; CLASSIFICATION RATES; DATA SETS; GRAMMAR RULES; INTRUSION DETECTION SYSTEM; INTRUSION DETECTION SYSTEMS; MULTI STAGE; PACKET DATA; SET OF RULES; SYSTEMATIC METHODOLOGY;

EID: 80052472204     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (22)
  • 1
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and L. J. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, no.4, pp.227-261, 2000.
    • (2000) ACM Transactions On Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, L.J.2
  • 5
    • 70449353683 scopus 로고    scopus 로고
    • Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
    • N. B. Anuar, H. Sallehudin, A. Gani and O. Zakari, Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree, Malaysian Journal of Computer Science, vol.21, no.(2), pp.101-105, 2008.
    • (2008) Malaysian Journal of Computer Science , vol.21 , Issue.2 , pp. 101-105
    • Anuar, N.B.1    Sallehudin, H.2    Gani, A.3    Zakari, O.4
  • 7
    • 33745498517 scopus 로고    scopus 로고
    • Applications of fuzzy data mining methods for intrusion detection systems
    • J. Guan, D. Liu and T. Wang, Applications of fuzzy data mining methods for intrusion detection systems, ICCSA, pp.706-714, 2004.
    • (2004) ICCSA , pp. 706-714
    • Guan, J.1    Liu, D.2    Wang, T.3
  • 10
    • 34247636165 scopus 로고    scopus 로고
    • Genetic-fuzzy rule mining approach and evaluation of fea-ture selection techniques for anomaly intrusion detection
    • C.-H. Tsang, S. Kwong and H. Wang, Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection, Elsevier, Journal of Pattern Recognition Society, vol.40, pp.2373-2391, 2007.
    • (2007) Elsevier, Journal of Pattern Recognition Society , vol.40 , pp. 2373-2391
    • Tsang, C.-H.1    Kwong, S.2    Wang, H.3
  • 12
    • 26944437843 scopus 로고    scopus 로고
    • An adaptive network intrusion detection method based on PCA and support vector machines
    • X. Xu and X. Wang, An adaptive network intrusion detection method based on PCA and support vector machines, ADMA 05, pp.696-703, 2005.
    • (2005) ADMA , vol.5 , pp. 696-703
    • Xu, X.1    Wang, X.2
  • 14
    • 34250801472 scopus 로고    scopus 로고
    • A hybrid machine learning approach to network anomaly detection
    • T. Shon and J. Moon, A hybrid machine learning approach to network anomaly detection, Elsevier, Journal of Information Sciences, vol.177, pp.3799-3821, 2007.
    • (2007) Elsevier, Journal of Information Sciences , vol.177 , pp. 3799-3821
    • Shon, T.1    Moon, J.2
  • 17
    • 33846294027 scopus 로고    scopus 로고
    • Automatic generation of buffer overow attack signatures: An approach based on program behavior models
    • Tucson, AZ
    • Z. Liang and R. Sekar, Automatic generation of buffer overow attack signatures: An approach based on program behavior models, The 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005.
    • (2005) The 21st Annual Computer Security Applications Conference
    • Liang, Z.1    Sekar, R.2
  • 20
    • 77953888473 scopus 로고    scopus 로고
    • FA and SVDFRM base network detection classification model
    • L. Xie and H. Yang, FA and SVDFRM base network detection classification model, ICIC Express Letters, vol.3, no.3(A), pp.421-426, 2009.
    • (2009) ICIC Express Letters , vol.3 , Issue.3 , pp. 421-426
    • Xie, L.1    Yang, H.2
  • 22
    • 63549088306 scopus 로고    scopus 로고
    • Application of BPNN in classification of time inter-vals for intelligent intrusion detection decision response system
    • H. Zhu, H. Kai, K. Eguchi, Z. Guo and J. Wang, Application of BPNN in classification of time inter-vals for intelligent intrusion detection decision response system, International Journal of Innovative Computing, Information and Control, vol.4, no.10, pp.2483-2492, 2008.
    • (2008) International Journal of Innovative Computing, Information and Control , vol.4 , Issue.10 , pp. 2483-2492
    • Zhu, H.1    Kai, H.2    Eguchi, K.3    Guo, Z.4    Wang, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.