메뉴 건너뛰기




Volumn 28, Issue , 2012, Pages 88-96

An ensemble design of intrusion detection system for handling uncertainty using Neutrosophic Logic Classifier

Author keywords

Fuzzy; Improvised genetic algorithm; Intrusion; KDD cup; Membership; Neutrosophic; Uncertainty

Indexed keywords

FUZZY; INTRUSION; KDD CUP; MEMBERSHIP; NEUTROSOPHIC; UNCERTAINTY;

EID: 84856226719     PISSN: 09507051     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.knosys.2011.12.004     Document Type: Article
Times cited : (82)

References (24)
  • 1
    • 77949439705 scopus 로고    scopus 로고
    • Research of Data Mining in intrusion detection system and the Uncertainty of the Attack
    • 18-20 January ISBN:978-1-4244-5272-9, INSPEC Accession Number: 11069703
    • Wei Liu, Research of Data Mining in intrusion detection system and the Uncertainty of the Attack, in: International Symposium on Computer Network and Multimedia Technology, 2009, CNMT 2009, 18-20 January 2009, pp. 1-4, ISBN:978-1-4244-5272-9, INSPEC Accession Number: 11069703.
    • (2009) International Symposium on Computer Network and Multimedia Technology, 2009, CNMT 2009 , pp. 1-4
    • Liu, W.1
  • 3
    • 84856234332 scopus 로고    scopus 로고
    • Data Mining and Knowledge Discovery Handbook Springer
    • Oded Z. Maimon Lior Rokach Data Mining and Knowledge Discovery Handbook 2005 Springer
    • (2005) Lior Rokach
    • Maimon, O.Z.1
  • 4
    • 77950551315 scopus 로고    scopus 로고
    • Efficient intrusion detection with reduced dimension using data mining classification methods and their performance comparison
    • V.V. Das et al. (Eds.) Springer-Verlag, Berlin, Heidelberg
    • B. Kavitha, S. Karthikeyan, B. Chitra, Efficient intrusion detection with reduced dimension using data mining classification methods and their performance comparison, in: V.V. Das et al. (Eds.): BAIP 2010, CCIS 70, 2010, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 96-101.
    • (2010) BAIP 2010, CCIS 70, 2010 , pp. 96-101
    • Kavitha, B.1    Karthikeyan, S.2    Chitra, B.3
  • 10
    • 84856230755 scopus 로고    scopus 로고
    • Enhancing profiles for anomaly detection using time granularities, Center for secure information systems
    • in press
    • Yingjiu Li et al., Enhancing profiles for anomaly detection using time granularities, Center for secure information systems, Journal of Computer Security, in press.
    • Journal of Computer Security
    • Li, Y.1
  • 12
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Chalmers University of Technology, Sweden, March
    • Stefan Axelsson, Intrusion detection systems: a survey and taxonomy, Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000.
    • (2000) Technical Report No 99-15, Dept. of Computer Engineering
    • Axelsson, S.1
  • 13
    • 84856234333 scopus 로고    scopus 로고
    • KDDCup99datasets,The UCI KDD Archive
    • KDDCup99datasets,The UCI KDD Archive: http:/ kdd.ics.ucs.edu / databases /kddcup99 /kddcup99.html.
  • 14
    • 26944485964 scopus 로고    scopus 로고
    • A Unifying Field in Logics: Neutrosophic Field
    • F. Smarandache, A unifying field in logics: neutrosophic logic, Multiple-Valued Logic/An International Journal 8 (3) (2002) 385-438, http://www.gallup.unm.edu/∼smarandache/eBook-neutrosophics2.pdf. (Pubitemid 36047938)
    • (2002) Multiple Valued Logic , vol.8 , Issue.3 , pp. 385-438
    • Smarandache, F.1
  • 15
    • 33751110112 scopus 로고    scopus 로고
    • Neutrosophy, a New Branch of Philosophy
    • F. Smarandache, Neutrosophy, A new branch of philosophy, in multiple-valued logic, An International Journal 8(3) (2002) 297-384. (Pubitemid 36047937)
    • (2002) Multiple Valued Logic , vol.8 , Issue.3 , pp. 297-384
    • Smarandache, F.1
  • 21
    • 34548453089 scopus 로고    scopus 로고
    • An agent based and biological inspired real-time intrusion detection and security model for computer network operations
    • DOI 10.1016/j.comcom.2007.03.008, PII S0140366407001181
    • Azzedine Boukerche, Renato B. Machado, Kathia R.L. Jucá, João Bosco M. Sobral, and Mirela S.M.A. Notare An agent based and biological inspired real-time intrusion detection and security model for computer network operations Computer Communications 30 13 2007 2649 2660 (Pubitemid 47368641)
    • (2007) Computer Communications , vol.30 , Issue.13 , pp. 2649-2660
    • Boukerche, A.1    Machado, R.B.2    Juca, K.R.L.3    Sobral, J.B.M.4    Notare, M.S.M.A.5
  • 22
    • 59349106158 scopus 로고    scopus 로고
    • Distributed agents model for intrusion detection based on AIS
    • Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, and SunJun Liu Distributed agents model for intrusion detection based on AIS Knowledge-Based Systems 22 2 2009 115 119
    • (2009) Knowledge-Based Systems , vol.22 , Issue.2 , pp. 115-119
    • Yang, J.1    Liu, X.2    Li, T.3    Liang, G.4    Liu, S.5
  • 23
    • 78650805266 scopus 로고    scopus 로고
    • Finding key attribute subset in dataset for outlier detection
    • Peng Yang, and Qingsheng Zhu Finding key attribute subset in dataset for outlier detection Knowledge-Based Systems 24 2 2011 269 274
    • (2011) Knowledge-Based Systems , vol.24 , Issue.2 , pp. 269-274
    • Yang, P.1    Zhu, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.