메뉴 건너뛰기




Volumn 30, Issue 8, 2011, Pages 625-642

Swarm intelligence in intrusion detection: A survey

Author keywords

Ant colony clustering; Ant colony optimization; Intrusion detection; Particle swarm optimization; Survey; Swarm intelligence

Indexed keywords

ANT COLONY OPTIMIZATION; EFFICIENCY; PARTICLE SWARM OPTIMIZATION (PSO); SURVEYING; SURVEYS; SWARM INTELLIGENCE;

EID: 80955142722     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.08.009     Document Type: Article
Times cited : (179)

References (112)
  • 1
    • 80955163766 scopus 로고    scopus 로고
    • A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection
    • M.S. Abadeh, and J. Habibi A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection The ISC International Journal of Information Security 2 1 2010 33 46
    • (2010) The ISC International Journal of Information Security , vol.2 , Issue.1 , pp. 33-46
    • Abadeh, M.S.1    Habibi, J.2
  • 11
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C.J.C. Burges A tutorial on support vector machines for pattern recognition Knowledge Discovery and Data Mining 2 2 1998 121 167 (Pubitemid 128695475)
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 15
    • 34249753618 scopus 로고
    • Support vector networks
    • C. Cortes, and V. Vapnik Support vector networks Machine Learning 20 1995 273 297
    • (1995) Machine Learning , vol.20 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 16
    • 80955158667 scopus 로고    scopus 로고
    • Retrieved January 26
    • The DARPA-Lincoln Dataset. Retrieved January 26, 2008, from http://www.ll.mit.edu/IST/ideval/data/data-index.html.
    • (2008) The DARPA-Lincoln Dataset
  • 24
    • 33846814873 scopus 로고    scopus 로고
    • Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers
    • DOI 10.1016/j.asoc.2006.05.001, PII S1568494606000512
    • G. Dozier, D. Brown, H. Hou, and J. Hurley Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers Applied Soft Computing 7 2 2007 547 553 (Pubitemid 46205472)
    • (2007) Applied Soft Computing Journal , vol.7 , Issue.2 , pp. 547-553
    • Dozier, G.1    Brown, D.2    Hou, H.3    Hurley, J.4
  • 25
    • 77949551669 scopus 로고    scopus 로고
    • Intrusion detection system based on support vector machine and active learning
    • D. Duan, S. Chen, and W. Yang Intrusion detection system based on support vector machine and active learning Computer: Engineering 2007
    • (2007) Computer: Engineering
    • Duan, D.1    Chen, S.2    Yang, W.3
  • 26
    • 0038428854 scopus 로고    scopus 로고
    • Results of the KDD'99 classifier learning contest. SIGKDD
    • C. Elkan Results of the KDD'99 classifier learning contest. SIGKDD Explor. Newsl 1 2 1999 63 64
    • (1999) Explor. Newsl , vol.1 , Issue.2 , pp. 63-64
    • Elkan, C.1
  • 29
    • 34547543189 scopus 로고    scopus 로고
    • Clustering based on self-organizing ant colony networks with application to intrusion detection
    • DOI 10.1109/ISDA.2006.253761, 4021813, Proceedings - ISDA 2006: Sixth International Conference on Intelligent Systems Design and Applications
    • Feng Y, Zhong J, Ye CY, Wu ZF. Clustering based on self-organizing ant colony networks with application to intrusion detection. In: Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA '06). 2006. p.1077-1080. (Pubitemid 47179196)
    • (2006) Proceedings - ISDA 2006: Sixth International Conference on Intelligent Systems Design and Applications , vol.2 , pp. 1077-1080
    • Feng, Y.1    Zhong, J.2    Ye, C.-X.3    Wu, Z.-F.4
  • 32
    • 84971386868 scopus 로고
    • Flocks, herds, and schools: A distributed behavioral model
    • RG Reynolds Flocks, herds, and schools: a distributed behavioral model Computer Graphics 21 4 1987 25 34
    • (1987) Computer Graphics , vol.21 , Issue.4 , pp. 25-34
    • Rg, R.1
  • 38
  • 43
    • 0033329971 scopus 로고    scopus 로고
    • Improving the performance of fuzzy classifier systems for pattern classification problems with continuous attributes
    • DOI 10.1109/41.807986
    • H. Ishibuchi, and T. Nakashima Improving the performance of fuzzy classifier systems for pattern classification problems with continuous attributes IEEE Transactions on Industrial Electronics 46 6 1999 1057 1068 (Pubitemid 30527844)
    • (1999) IEEE Transactions on Industrial Electronics , vol.46 , Issue.6 , pp. 1057-1068
    • Ishibuchi, H.1    Nakashima, T.2
  • 44
    • 80955163758 scopus 로고    scopus 로고
    • Performance evaluation of fuzzy classifier systems for multi-dimensional pattern classification problems. IEEE Transactions on Systems
    • H. Ishibuchi, T. Nakashima, and T. Muratam Performance evaluation of fuzzy classifier systems for multi-dimensional pattern classification problems. IEEE Transactions on Systems Man and Cybernetics 21 5 1999 61 68
    • (1999) Man and Cybernetics , vol.21 , Issue.5 , pp. 61-68
    • Ishibuchi, H.1    Nakashima, T.2    Muratam, T.3
  • 51
    • 80955158626 scopus 로고    scopus 로고
    • Retrieved January 26
    • The KDD99 Dataset. Retrieved January 26, 2008, from http://kdd.ics.uci. edu/databases/kddcup99/task.html.
    • (2008) The KDD99 Dataset
  • 64
    • 76449122009 scopus 로고    scopus 로고
    • Wavelet fuzzy neural network based on modified QPSO for network anomaly detection
    • R.-H. Ma, and Y. Liu Wavelet fuzzy neural network based on modified QPSO for network anomaly detection Applied Mechanics and Materials 20-23 2010 1378 1384
    • (2010) Applied Mechanics and Materials , vol.2023 , pp. 1378-1384
    • Ma, R.-H.1    Liu, Y.2
  • 70
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory ACM Transactions on Information and System Security (TISSEC) 3 4 2000 262 294
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 72
    • 0027205884 scopus 로고
    • A scaled conjugate gradient algorithm for fast supervised learning
    • M.F. Moller A scaled conjugate gradient algorithm for fast supervised learning Neural Networks 6 4 1993 525 533
    • (1993) Neural Networks , vol.6 , Issue.4 , pp. 525-533
    • Moller, M.F.1
  • 75
  • 80
    • 53849148915 scopus 로고    scopus 로고
    • FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
    • C. Ramachandran, S. Misra, and M.S. Obaidat FORK: a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks Computer Communications 31 16 2008 3855 3869
    • (2008) Computer Communications , vol.31 , Issue.16 , pp. 3855-3869
    • Ramachandran, C.1    Misra, S.2    Obaidat, M.S.3
  • 82
    • 49649112245 scopus 로고    scopus 로고
    • Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
    • M. Sabhnani, and G. Serpen Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set Journal of Intelligent Data Analysis 8 4 2004 403 415
    • (2004) Journal of Intelligent Data Analysis , vol.8 , Issue.4 , pp. 403-415
    • Sabhnani, M.1    Serpen, G.2
  • 85
    • 33845621875 scopus 로고    scopus 로고
    • A hybrid approach for feature subset selection using neural networks and ant colony optimization
    • DOI 10.1016/j.eswa.2006.04.010, PII S0957417406001187
    • R.K. Sivagaminathan, and S. Ramakrishnan A hybrid approach for feature subset selection using neural networks and ant colony optimization Expert Systems with Applications 33 1 2007 49 60 (Pubitemid 44959916)
    • (2007) Expert Systems with Applications , vol.33 , Issue.1 , pp. 49-60
    • Sivagaminathan, R.K.1    Ramakrishnan, S.2
  • 89
    • 80955142846 scopus 로고    scopus 로고
    • (Online Material)
    • Swarm Intelligence in Intrusion Detection: A Survey (Online Material), http://www.icsd.aegean.gr/postgraduates/kkolias/swarm-intelligence-in-intrusion- detection/online-resources.pdf
    • Swarm Intelligence in Intrusion Detection: A Survey
  • 95
    • 33847299487 scopus 로고    scopus 로고
    • Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
    • Tsang CH, Kwong S. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In: Proceedings of the IEEE International Conference on Industrial Technology 2005 (ICIT 2005). p.51-56.
    • (2005) Proceedings of the IEEE International Conference on Industrial Technology (ICIT 2005) , pp. 51-56
    • Ch, T.1    Kwong, S.2
  • 96
    • 33846318873 scopus 로고    scopus 로고
    • Ant colony clustering and feature extraction for anomaly intrusion detection
    • W. Tsang, and S. Kwong Ant colony clustering and feature extraction for anomaly intrusion detection Swarm Intelligence in Data Mining 2006 101 121
    • (2006) Swarm Intelligence in Data Mining , pp. 101-121
    • Tsang, W.1    Kwong, S.2
  • 97
    • 80955163750 scopus 로고    scopus 로고
    • Retrieved January 26, 2008
    • The Unix User Dataset. Retrieved January 26, 2008, from http://kdd.ics.uci.edu/databases/UNIX-user-data/UNIX-user-data.htm.
    • The Unix User Dataset
  • 99
    • 27544463917 scopus 로고    scopus 로고
    • A clustering algorithm for intrusion detection
    • DOI 10.1117/12.603567, 04, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005
    • Wang Q, Megalooikonomou V. A clustering algorithm for intrusion detection. In: Proceedings of the SPIE Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005. p.31-38. (Pubitemid 41545369)
    • (2005) Proceedings of SPIE - The International Society for Optical Engineering , vol.5812 , pp. 31-38
    • Wang, Q.1    Megalooikonomou, V.2
  • 103
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S.X. Wu, and W. Banzhaf The use of computational intelligence in intrusion detection systems: a review Applied Soft Computing 10 1 2010 1 35
    • (2010) Applied Soft Computing , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 105
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang Security in mobile ad hoc networks: challenges and solutions IEEE Wireless Communications 11 1 2004 38 47
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 107
    • 34248666540 scopus 로고
    • Fuzzy sets
    • Zadeh LA. Fuzzy sets. Inf. Control 8 1965. p. 338-353.
    • (1965) Inf. Control , vol.8 , pp. 338-353
    • Zadeh, L.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.