메뉴 건너뛰기




Volumn 75, Issue 1, 2012, Pages 135-145

Improved competitive learning neural networks for network intrusion and fraud detection

Author keywords

Competitive learning; Fraud detection; Intrusion detection; Neural network; Supervised unsupervised clustering

Indexed keywords

CRIME; INTRUSION DETECTION; LEARNING ALGORITHMS; LEARNING SYSTEMS; NEURAL NETWORKS;

EID: 82455199118     PISSN: 09252312     EISSN: 18728286     Source Type: Journal    
DOI: 10.1016/j.neucom.2011.02.021     Document Type: Article
Times cited : (64)

References (26)
  • 1
    • 77954653785 scopus 로고    scopus 로고
    • Hybrid learning machines, Neurocomputing (13-15
    • A. Abraham, E. Corchado, J.M. Corchado, Hybrid learning machines, Neurocomputing (13-15) (2009) 2729-2730.
    • (2009) , pp. 2729-2730
    • Abraham, A.1    Corchado, E.2    Corchado, J.M.3
  • 3
    • 0033344304 scopus 로고    scopus 로고
    • Neural data mining for credit card fraud detection, in: ICTAI
    • R. Brause, T. Langsdorf, M. Hepp, Neural data mining for credit card fraud detection, in: ICTAI, 1999, pp. 103-106.
    • (1999) , pp. 103-106
    • Brause, R.1    Langsdorf, T.2    Hepp, M.3
  • 4
    • 82455185170 scopus 로고
    • Classification and Regression Trees, Wadsworth International
    • L. Breiman, J. Friedman, R. Olshen, C. Stone, Classification and Regression Trees, Wadsworth International, 1984, pp. 21-28.
    • (1984) , pp. 21-28
    • Breiman, L.1    Friedman, J.2    Olshen, R.3    Stone, C.4
  • 5
    • 82455220493 scopus 로고    scopus 로고
    • Artificial neural networks for misuse detection, in: Proceedings of the 1998 National Information Systems Security Conference, Arlington, VA
    • J. Cannady, Artificial neural networks for misuse detection, in: Proceedings of the 1998 National Information Systems Security Conference, Arlington, VA, 1998, pp. 443-456.
    • (1998) , pp. 443-456
    • Cannady, J.1
  • 7
    • 0027837024 scopus 로고
    • Experiments in multistrategy learning by meta-learning, in: Proceedings of the Second International Conference on Information and Knowledge Management
    • P.K. Chan, S.J. Stolfo, Experiments in multistrategy learning by meta-learning, in: Proceedings of the Second International Conference on Information and Knowledge Management, 1993, pp. 314-323.
    • (1993) , pp. 314-323
    • Chan, P.K.1    Stolfo, S.J.2
  • 8
    • 78049271779 scopus 로고    scopus 로고
    • Hybrid intelligent algorithms and applications, Information Science
    • E. Corchado, A. Abraham, A.C.P.L.F. de Carvalho, Hybrid intelligent algorithms and applications, Information Science (14) (2010) 2633-2634.
    • (2010) , vol.14 , pp. 2633-2634
    • Corchado, E.1    Abraham, A.2    de Carvalho, A.C.P.L.F.3
  • 9
    • 82455209098 scopus 로고    scopus 로고
    • Fuzzy and Neuro-fuzzy Intelligent Systems, Physica-Verlag, Heidelberg
    • E. Czogala, J. Leski, Fuzzy and Neuro-fuzzy Intelligent Systems, Physica-Verlag, Heidelberg, 2000, pp. 107-127.
    • (2000) , pp. 107-127
    • Czogala, E.1    Leski, J.2
  • 10
    • 82455209102 scopus 로고    scopus 로고
    • Data mining for network intrusion detection, in: Proceeding NSF Workshop on Next Generation Data Mining
    • P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan, Data mining for network intrusion detection, in: Proceeding NSF Workshop on Next Generation Data Mining, 2002, pp. 21-30.
    • (2002) , pp. 21-30
    • Dokas, P.1    Ertoz, L.2    Kumar, V.3    Lazarevic, A.4    Srivastava, J.5    Tan, P.6
  • 16
    • 82455174945 scopus 로고    scopus 로고
    • The UCI KDD archive, 1999, University of California Department of Information and Computer Science, Irvine, CA
    • S. Hettich, S.D. Bay, The UCI KDD archive, 1999, University of California Department of Information and Computer Science, Irvine, CA, 2004, p. 1. http://kdd.ics.uci.edu.
    • (2004) , pp. 1
    • Hettich, S.1    Bay, S.D.2
  • 21
    • 35048836559 scopus 로고    scopus 로고
    • Network intrusion detection using genetic clustering, in: Genetic and Evolutionary Computation, 3103/2004
    • E. Leon, O. Nasraoui, J. Gomez, Network intrusion detection using genetic clustering, in: Genetic and Evolutionary Computation, vol. 3103/2004, 2004, pp. 1312-1313.
    • (2004) , pp. 1312-1313
    • Leon, E.1    Nasraoui, O.2    Gomez, J.3
  • 22
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • Lippmann R.P., Cunningham R.K. Improving intrusion detection performance using keyword selection and neural networks. Computer Networks 2000, 34(4):597-603.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 597-603
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 23
    • 78650135042 scopus 로고    scopus 로고
    • MOVIH-IDS: a mobile visualization hybrid intrusion detection system, Neurocomputing (13-15)
    • Á. Herrero, E. Corchado, M.A. Pellicer, A. Abraham, MOVIH-IDS: a mobile visualization hybrid intrusion detection system, Neurocomputing (13-15) (2009) 2775-2784.
    • (2009) , pp. 2775-2784
    • Herrero, Á.1    Corchado, E.2    Pellicer, M.A.3    Abraham, A.4
  • 24
    • 84971552523 scopus 로고    scopus 로고
    • Cyber security challenges: designing efficient intrusion detection systems and antivirus tools
    • CRC Press, USA
    • Mukkamala S., Sung A., Abraham A. Cyber security challenges: designing efficient intrusion detection systems and antivirus tools. Enhancing Computer Security with Smart Technology 2005, CRC Press, USA.
    • (2005) Enhancing Computer Security with Smart Technology
    • Mukkamala, S.1    Sung, A.2    Abraham, A.3
  • 26
    • 82455174717 scopus 로고    scopus 로고
    • Counter Hack: A Step-by-step Guide to Computer Attacks and Effective Defenses
    • E. Skoudis, Counter Hack: A Step-by-step Guide to Computer Attacks and Effective Defenses, 2002.
    • (2002)
    • Skoudis, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.