메뉴 건너뛰기




Volumn 39, Issue 1, 2012, Pages 424-430

An efficient intrusion detection system based on support vector machines and gradually feature removal method

Author keywords

Feature reduction; Intrusion detection; Support vector machine

Indexed keywords

ANT COLONY ALGORITHMS; CLUSTERING METHODS; CORRELATION COEFFICIENT; CROSS VALIDATION; DATA FEATURE; FEATURE REDUCTION; INTRUSION DETECTION SYSTEMS; REMOVAL METHOD; SUPPORT VECTOR;

EID: 81855197007     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2011.07.032     Document Type: Article
Times cited : (328)

References (21)
  • 2
    • 0014060964 scopus 로고
    • A clustering technique for summarizing multivariate data
    • G. Ball, and D. Hall A clustering technique for summarizing multivariate data Behavioral Science 12 1967 153 155
    • (1967) Behavioral Science , vol.12 , pp. 153-155
    • Ball, G.1    Hall, D.2
  • 3
    • 0000667930 scopus 로고    scopus 로고
    • Training nu-support vector classifiers: Theory and algorithms
    • C.C. Chang, and C.J. Lin Training nu-support vector classifiers: Theory and algorithms Neural Computation 13 9 2001 2119 2147
    • (2001) Neural Computation , vol.13 , Issue.9 , pp. 2119-2147
    • Chang, C.C.1    Lin, C.J.2
  • 4
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • S. Chebrolu, A. Abraham, and J.P. Thomas Feature deduction and ensemble design of intrusion detection systems Computers and Security 24 4 2005 295 307
    • (2005) Computers and Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 6
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Systems with Applications 29 2005 713 722
    • (2005) Expert Systems with Applications , vol.29 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 7
    • 77950021963 scopus 로고    scopus 로고
    • CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS
    • J.F.C. Joseph, A. Das, B.S. Lee, and B.C. Seet CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS Computer Networks 54 7 2010 1126 1141
    • (2010) Computer Networks , vol.54 , Issue.7 , pp. 1126-1141
    • Joseph, J.F.C.1    Das, A.2    Lee, B.S.3    Seet, B.C.4
  • 8
    • 36049030250 scopus 로고    scopus 로고
    • A new intrusion detection system using support vector machines and hierarchical clustering
    • L. Khan, M. Awad, and B. Thuraisingham A new intrusion detection system using support vector machines and hierarchical clustering The VLDB Journal 16 2007 507 521
    • (2007) The VLDB Journal , vol.16 , pp. 507-521
    • Khan, L.1    Awad, M.2    Thuraisingham, B.3
  • 9
    • 0031381525 scopus 로고    scopus 로고
    • Wrappers for feature subset selection
    • R. Kohavi, and G.H. John Wrappers for feature subset selection Artificial Intelligence 97 1997 273 324
    • (1997) Artificial Intelligence , vol.97 , pp. 273-324
    • Kohavi, R.1    John, G.H.2
  • 10
    • 36549085110 scopus 로고    scopus 로고
    • An active learning based TCM-KNN algorithm for supervised network intrusion detection
    • Y. Li, and L. Guo An active learning based TCM-KNN algorithm for supervised network intrusion detection Computer and Security 26 2007 459 467
    • (2007) Computer and Security , vol.26 , pp. 459-467
    • Li, Y.1    Guo, L.2
  • 11
    • 67649726426 scopus 로고    scopus 로고
    • Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
    • Y. Li, J.L. Wang, Z.H. Tian, T.B. Lu, and C. Young Building lightweight intrusion detection system using wrapper-based feature selection mechanisms Computers and Security 28 6 2009 466 475
    • (2009) Computers and Security , vol.28 , Issue.6 , pp. 466-475
    • Li, Y.1    Wang, J.L.2    Tian, Z.H.3    Lu, T.B.4    Young, C.5
  • 13
    • 69249216488 scopus 로고    scopus 로고
    • An adaptive genetic-based signature learning system for intrusion detection
    • K. Shafi, and H.A. Abbass An adaptive genetic-based signature learning system for intrusion detection Expert Systems with Applications 36 10 2009 12036 12043
    • (2009) Expert Systems with Applications , vol.36 , Issue.10 , pp. 12036-12043
    • Shafi, K.1    Abbass, H.A.2
  • 15
    • 68949161842 scopus 로고    scopus 로고
    • A triangle area based nearest neighbors approach to intrusion detection
    • C.F. Tsai, and C.Y. Lin A triangle area based nearest neighbors approach to intrusion detection Pattern Recognition 43 1 2010 222 229
    • (2010) Pattern Recognition , vol.43 , Issue.1 , pp. 222-229
    • Tsai, C.F.1    Lin, C.Y.2
  • 16
    • 34247636165 scopus 로고    scopus 로고
    • Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
    • C.H. Tsang, S. Kwong, and H. Wang Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection Pattern Recognition 40 2007 2373 2391
    • (2007) Pattern Recognition , vol.40 , pp. 2373-2391
    • Tsang, C.H.1    Kwong, S.2    Wang, H.3
  • 19
    • 84941079784 scopus 로고    scopus 로고
    • A new approach to intrusion detection using artificial neural networks and fuzzy clustering
    • G. Wang, J. Hao, J. Ma, and L. Huang A new approach to intrusion detection using artificial neural networks and fuzzy clustering Expert Systems with Applications 37 2010 6225 6232
    • (2010) Expert Systems with Applications , vol.37 , pp. 6225-6232
    • Wang, G.1    Hao, J.2    Ma, J.3    Huang, L.4
  • 20
    • 70350134739 scopus 로고    scopus 로고
    • Use of computational intelligence in intrusion detection systems: A review
    • S.X. Wu, and W. Banzhaf Use of computational intelligence in intrusion detection systems: A review Applied Soft Computing 10 1 2010 1 35
    • (2010) Applied Soft Computing , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 21
    • 40849099949 scopus 로고    scopus 로고
    • Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
    • C. Xiang, P.C. Yong, and L.S. Meng Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees Pattern Recognition Letters 29 7 2008 918 924
    • (2008) Pattern Recognition Letters , vol.29 , Issue.7 , pp. 918-924
    • Xiang, C.1    Yong, P.C.2    Meng, L.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.