메뉴 건너뛰기




Volumn , Issue , 2011, Pages 155-160

Computer network security based on Support Vector Machine approach

Author keywords

Intrusion Detection System; Network Security; Principal Component Analysis

Indexed keywords

ANOMALY INTRUSION DETECTION; DETECTION RATES; FALSE ALARMS; FALSE POSITIVE DETECTION; HIGH DIMENSIONAL DATA; HYBRID METHOD; INFORMATION SYSTEMS SECURITY; INTRUSION DETECTION SYSTEMS; LEARNING SCHEMES;

EID: 84856550945     PISSN: 15987833     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (28)
  • 2
    • 74049129143 scopus 로고    scopus 로고
    • ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
    • Swarm Intelligence and Patterns special session at WSTST-05 - 4th IEEE International Conference on Soft Computing as Trans disciplinary Science and Technology - Japan, Springer-Verlag, Germany, May
    • V. Ramos, A. Abraham, ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System, In Swarm Intelligence and Patterns special session at WSTST-05 - 4th IEEE International Conference on Soft Computing as Trans disciplinary Science and Technology - Japan, LNCS series, Springer-Verlag, Germany, May 2005, pp. 977-986.
    • (2005) LNCS Series , pp. 977-986
    • Ramos, V.1    Abraham, A.2
  • 4
    • 0007473204 scopus 로고    scopus 로고
    • An Introduction to Intrusion Detection
    • April
    • A. Sundaram, An Introduction to Intrusion Detection, Crossroads: The ACM student magazine, Vol. 2, No. 4, April 1996.
    • (1996) Crossroads: The ACM Student Magazine , vol.2 , Issue.4
    • Sundaram, A.1
  • 8
    • 0037332841 scopus 로고    scopus 로고
    • Rough set methods in feature selection and recognition
    • March
    • Roman W. Swiniarski, Andrzej Skowron, Rough set methods in feature selection and recognition, Pattern Recognition Letters, v.24 n.6, p.833-849, March 2003.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.6 , pp. 833-849
    • Swiniarski, R.W.1    Skowron, A.2
  • 11
    • 33645961388 scopus 로고    scopus 로고
    • An artificial immune system for fuzzy-rule induction in data mining
    • Berlin: Springer-Verlag
    • R.T. Alves, M.R.B.S. Delgado, H.S. Lopes, A.A. Freitas, An artificial immune system for fuzzy-rule induction in data mining, Lecture Notes in Computer Science, Berlin: Springer-Verlag,Vol.3242, 2004, pp.1011-1020.
    • (2004) Lecture Notes in Computer Science , vol.3242 , pp. 1011-1020
    • Alves, R.T.1    Delgado, M.R.B.S.2    Lopes, H.S.3    Freitas, A.A.4
  • 19
    • 33744522522 scopus 로고    scopus 로고
    • Intrusion Detection System Based on Multi-class SVM
    • H. Lee, J. Song, D. Park, Intrusion Detection System Based on Multi-class SVM, RSFDGrC, Vol. 2, 2005, pp. 511-519
    • (2005) RSFDGrC , vol.2 , pp. 511-519
    • Lee, H.1    Song, J.2    Park, D.3
  • 23
    • 0003250435 scopus 로고
    • Single-layer Learning Revisited: A Stepwise Procedure for Building and Training a Neural Network
    • J. Fogelman, editor, Springer-Verlag
    • S. Knerrr, L. Personnaz, and G. Dreyfus, Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network, In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
    • (1990) Neurocomputing: Algorithms, Architectures and Applications
    • Knerrr, S.1    Personnaz, L.2    Dreyfus, G.3
  • 24
    • 24944586818 scopus 로고    scopus 로고
    • Network-Based Intrusion Detection with Support Vector Machines
    • D. S. Kim, J. S. Park, Network-Based Intrusion Detection with Support Vector Machines, ICOIN, 2003, pp. 747-756.
    • (2003) ICOIN , pp. 747-756
    • Kim, D.S.1    Park, J.S.2
  • 25
    • 84856544792 scopus 로고    scopus 로고
    • KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
    • (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.