메뉴 건너뛰기




Volumn 65, Issue 2, 2011, Pages 246-259

A refined differential evolution algorithm based fuzzy classifier for intrusion detection

Author keywords

Differential evolution; Intrusion detection; KDD cup data set; Local search

Indexed keywords


EID: 83455235978     PISSN: 1450216X     EISSN: 1450202X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (37)
  • 1
    • 0029242750 scopus 로고
    • A method for fuzzy rules extraction directly from numerical data and its application to pattern classification
    • Abe, S., & Lan, M.-S. (1995). A method for fuzzy rules extraction directly from numerical data and its application to pattern classification. IEEE Transactions on Fuzzy Systems, 3(1), 18-28
    • (1995) IEEE Transactions on Fuzzy Systems , vol.3 , Issue.1 , pp. 18-28
    • Abe, S.1    Lan, M.-S.2
  • 2
    • 83455186043 scopus 로고
    • Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES
    • Menlo Park, CA
    • Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A., 1995. Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES).SRI-CSL-95-06, SRI International, Menlo Park, CA
    • (1995) SRI-CSL-95-06, SRI International
    • Anderson, D.1    Lunt, T.F.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5
  • 5
    • 0036588773 scopus 로고    scopus 로고
    • Incorporating soft computing techniques into a probabilistic intrusion detection system
    • DOI 10.1109/TSMCC.2002.801356
    • Cho, Sung-Bae (2002). Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Transactions on Systems, Man and Cybernetics, Part C, 32(2), 154-160 (Pubitemid 35289399)
    • (2002) IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews , vol.32 , Issue.2 , pp. 154-160
    • Cho, S.-B.1
  • 9
    • 0036079474 scopus 로고    scopus 로고
    • Discovering interesting classification rules with genetic programming
    • De Falco, I., Cioppa, A. D., & Tarantino, E. (2002). Discovering interesting classification rules with genetic programming. Applied Soft Computing, 23, 1-13
    • (2002) Applied Soft Computing , vol.23 , pp. 1-13
    • De Falco, I.1    Cioppa, A.D.2    Tarantino, E.3
  • 10
    • 0038428854 scopus 로고    scopus 로고
    • Results of the KDD-99 classifier learning
    • Elkan, C. (2000). Results of the KDD-99 classifier learning. ACM SIGKDD Explorations, 1, 63-64
    • (2000) ACM SIGKDD Explorations , vol.1 , pp. 63-64
    • Elkan, C.1
  • 16
    • 0027150412 scopus 로고
    • USTAT: A real-time intrusion detection system for UNIX
    • Oakland, CA, 24-26 May, IEEEComputer Society Press, Los Alamitos, CA
    • Ilgun, K., 1993. USTAT: A real-time intrusion detection system for UNIX.In: Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy, Oakland, CA, 24-26 May, IEEEComputer Society Press, Los Alamitos, CA, pp. 16-29
    • (1993) Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy , pp. 16-29
    • Ilgun, K.1
  • 17
    • 0035426682 scopus 로고    scopus 로고
    • Three-objective genetics-based machine learning for linguistic rule extraction
    • DOI 10.1016/S0020-0255(01)00144-X, PII S002002550100144X
    • Ishibuchi, H., Nakashima, T., & Murata, T. (2001). Three-objective genetics-based machine learning for linguistic rule extraction. Information Sciences, 109-133 (Pubitemid 32621497)
    • (2001) Information Sciences , vol.136 , Issue.1-4 , pp. 109-133
    • Ishibuchi, H.1    Nakashima, T.2    Murata, T.3
  • 18
    • 84873993999 scopus 로고    scopus 로고
    • KDD-Cup data set: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
    • KDD-Cup Data Set
  • 22
  • 23
    • 83455178723 scopus 로고    scopus 로고
    • Lincoln Laboratory MIT
    • Lincoln Laboratory MIT. http://www.ll.mit.edu
  • 25
    • 35548992415 scopus 로고    scopus 로고
    • A parallel genetic local search algorithm for intrusion detection in computer networks
    • DOI 10.1016/j.engappai.2007.02.007, PII S0952197607000206
    • Mohammad Saniee Abadeh, Jafar Habibi, Zeynab Barzegar, Muna Sergi (2007), A parallel genetic local search algorithm for intrusion detection, Engineering Applications of Artificial Intelligence 20 (8) 1058-1069 (Pubitemid 350016848)
    • (2007) Engineering Applications of Artificial Intelligence , vol.20 , Issue.8 , pp. 1058-1069
    • Saniee Abadeh, M.1    Habibi, J.2    Barzegar, Z.3    Sergi, M.4
  • 26
    • 0242468747 scopus 로고    scopus 로고
    • An anomaly intrusion detection method by clustering normal user behavior
    • Oh, S. H., & Lee, W. S. (2003). An anomaly intrusion detection method by clustering normal user behavior. Computers & Security, 22(7), 596-612
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 596-612
    • Oh, S.H.1    Lee, W.S.2
  • 27
    • 33750512162 scopus 로고    scopus 로고
    • Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
    • DOI 10.1016/j.jnca.2005.06.002, PII S1084804505000433, Network and Information Security: A Computational Intelligence Approach
    • Ozyer, T., Alhajj, R., & Barker, K. (2007). Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. Journal of Network and Computer Applications, 30, 99-113 (Pubitemid 44666485)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 99-113
    • Ozyer, T.1    Alhajj, R.2    Barker, K.3
  • 31
    • 33750528950 scopus 로고    scopus 로고
    • Intrusion detection using a fuzzy genetics-based learning algorithm
    • DOI 10.1016/j.jnca.2005.05.002, PII S1084804505000305, Network and Information Security: A Computational Intelligence Approach
    • Saniee Abadeh, M., Habibi, J., & Lucas, C. (2007). Intrusion detection using a fuzzy geneticsbased learning algorithm. Journal of Network and Computer Applications, 30(1), 414-428 (Pubitemid 44666474)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 414-428
    • Abadeh, M.S.1    Habibi, J.2    Lucas, C.3
  • 36
    • 10244261530 scopus 로고    scopus 로고
    • EWMA forecast of normal system activity for computer intrusion detection
    • Ye, N., Chen, Qiang, & Borror, Connie M. (2004). EWMA forecast of normal system activity for computer intrusion detection. IEEE Transactions on Reliability, 53(4
    • (2004) IEEE Transactions on Reliability , vol.53 , pp. 4
    • Ye, N.1    Chen, Q.2    Borror Connie, M.3
  • 37
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
    • Ye, N., Vilbert, S., & Chen, Q. (2003). Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability, 52(1).
    • (2003) IEEE Transactions on Reliability , vol.52 , pp. 1
    • Ye, N.1    Vilbert, S.2    Chen, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.