-
3
-
-
21644481499
-
A serial combination of anomaly and misuse IDSes applied to http traffic
-
E. Tombini, H. Debar, L. Me, and M. Ducasse, A serial combination of anomaly and misuse IDSes applied to http traffic, in: 20th Annual Computer Security Applications Conference, 2004, pp. 428-437.
-
20th Annual Computer Security Applications Conference, 2004
, pp. 428-437
-
-
Tombini, E.1
Debar, H.2
Me, L.3
Ducasse, M.4
-
4
-
-
1842712339
-
A genetic clustering method for intrusion detection
-
DOI 10.1016/j.patcog.2003.09.011, PII S0031320303003935
-
Y. Liu, K. Chen, X. Liao, W. Zhang, A genetic clustering method for intrusion detection, Pattern Recognition 37 (2004) 927-942. (Pubitemid 38473836)
-
(2004)
Pattern Recognition
, vol.37
, Issue.5
, pp. 927-942
-
-
Liu, Y.1
Chen, K.2
Liao, X.3
Zhang, W.4
-
5
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, U. Janoski, A. Sung, Intrusion detection using neural networks and support vector machines, in: Proceedings of IEEE International Joint Conference on Neural Networks, 2002, pp. 1702-1707.
-
Proceedings of IEEE International Joint Conference on Neural Networks, 2002
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, U.2
Sung, A.3
-
6
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
W. Lee, S. Stolfo, K. Mok, A data mining framework for building intrusion detection models, in: Proceedings IEEE Symposium on Security and Privacy, 1999, pp. 120-13 2.
-
Proceedings IEEE Symposium on Security and Privacy, 1999
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
7
-
-
17444432965
-
Hierarchical kohonen net for anomaly detection in network security
-
S T. Sarasamma, Q.A. Zhu, and J. Huff, Hierarchical kohonen net for anomaly detection in network security, IEEE Transactions on Systems, Man, and Cybernetics- Part B, 35(2) (2005) 302-312.
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics- Part B
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
8
-
-
1642354876
-
KDD-99 Classifier Learning Contest: LLSoft's Results Overview
-
I. Levin, KDD-99 Classifier Learning Contest: LLSoft's Results Overview, SIGKDD Explorations, 1(2000), 67-75.
-
(2000)
SIGKDD Explorations
, vol.1
, pp. 67-75
-
-
Levin, I.1
-
10
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
DOI 10.1016/j.patcog.2006.12.009, PII S0031320306005218
-
C.H. Tsang, S. Kwong, H. Wang, Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection, Pattern Recognition 40(9) (2007) 2373-2391. (Pubitemid 46669583)
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.-H.1
Kwong, S.2
Wang, H.3
-
11
-
-
0003753097
-
-
Prentice-Hall, Englewood Cliffs, New Jersey
-
J.S. Jang, C.T Sun, E. Mizutani, Neuro-fuzzy and soft computing: A computational approach to learning and machine intelligence, Prentice-Hall, Englewood Cliffs, New Jersey, 1996.
-
(1996)
Neuro-fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence
-
-
Jang, J.S.1
Sun, C.T.2
Mizutani, E.3
-
12
-
-
68949161842
-
A triangle area based nearest neighbors approach to intrusion detection
-
C.F. Tsai, C.Y. Lin, A triangle area based nearest neighbors approach to intrusion detection, Pattern Recognition 43(1) (2010) 222-229.
-
(2010)
Pattern Recognition
, vol.43
, Issue.1
, pp. 222-229
-
-
Tsai, C.F.1
Lin, C.Y.2
-
13
-
-
34248358287
-
Traffic classification using clustering algorithms
-
ACM Press
-
R. Luigi, T.E. Anderson, N. McKeown, Traffic classification using clustering algorithms, in Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, 2006, pp. 281-286.
-
(2006)
Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 281-286
-
-
Luigi, R.1
Anderson, T.E.2
McKeown, N.3
-
14
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
DOI 10.1016/j.patrec.2004.09.045, PII S0167865504002624
-
C. Zhang, J. Jiang, M. Kamel, Intrusion detection using hierarchical neural network. Pattern Recognition Letters 26(2005) 779-791. (Pubitemid 40430497)
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.6
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
15
-
-
84941079784
-
A new approach to intrusion detection using artificial neural networks and fuzzy clustering
-
G. Wang, J. Hao, J. Ma, L. Huang, A new approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert Systems with Applications 37 (2010) 6225-6232.
-
(2010)
Expert Systems with Applications
, vol.37
, pp. 6225-6232
-
-
Wang, G.1
Hao, J.2
Ma, J.3
Huang, L.4
-
16
-
-
58349096877
-
Data mining-based intrusion detectors
-
S. Wu, E. Yen, Data mining-based intrusion detectors, Expert Systems with Applications 36(2009) 5605-5612.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 5605-5612
-
-
Wu, S.1
Yen, E.2
-
18
-
-
35548992415
-
A parallel genetic local search algorithm for intrusion detection in computer networks
-
DOI 10.1016/j.engappai.2007.02.007, PII S0952197607000206
-
M.S. Abadeh, J. Habibi, Z. Barzegar, M. Sergi, A parallel genetic local search algorithm for intrusion detection in computer networks, Engineering Applications of Artificial Intelligence 20 (2007) 1058-1069. (Pubitemid 350016848)
-
(2007)
Engineering Applications of Artificial Intelligence
, vol.20
, Issue.8
, pp. 1058-1069
-
-
Saniee, A.M.1
Habibi, J.2
Barzegar, Z.3
Sergi, M.4
-
19
-
-
33947581868
-
Hybrid flexible neural-tree-based intrusion detection systems
-
DOI 10.1002/int.20203
-
Y. Chen, A. Abraham, B. Yang, Hybrid flexible neural-tree-based intrusion detection systems, International Journal of Intelligent Systems 22(2007)337-352. (Pubitemid 46480226)
-
(2007)
International Journal of Intelligent Systems
, vol.22
, Issue.4
, pp. 337-352
-
-
Chen, Y.1
Abraham, A.2
Yang, B.3
-
20
-
-
33947251166
-
A hierarchical SOM-based intrusion detection system
-
DOI 10.1016/j.engappai.2006.09.005, PII S0952197606001606
-
H.G. Kayacik, Z.-H. Nur, M.I. Heywood, A hierarchical SOM-based intrusion detection system, Engineering Applications of Artificial Intelligence 20 (2007) 439-451. (Pubitemid 46415731)
-
(2007)
Engineering Applications of Artificial Intelligence
, vol.20
, Issue.4
, pp. 439-451
-
-
Gunes, K.H.1
Nur Z.-Heywood, A.2
Heywood, M.I.3
-
21
-
-
36049030250
-
A new intrusion detection system using support vector machines and hierarchical clustering
-
L. Khan, M. Awad, B. Thuraisingham, A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB Journal 16 (2007) 507-521.
-
(2007)
The VLDB Journal
, vol.16
, pp. 507-521
-
-
Khan, L.1
Awad, M.2
Thuraisingham, B.3
-
22
-
-
33847406678
-
A hierarchical intrusion detection model based on the PCA neural networks
-
DOI 10.1016/j.neucom.2006.10.146, PII S0925231206004644, Advances in Computational Intelligence and Learning 14th European Symposium on Artificial Neural Networks 2006
-
G. Liu, Z. Yi, S. Yang, A hierarchical intrusion detection model based on the PCA neural networks, Neurocomputing 70 (2007) 1561-1568. (Pubitemid 46336771)
-
(2007)
Neurocomputing
, vol.70
, Issue.7-9
, pp. 1561-1568
-
-
Liu, G.1
Yi, Z.2
Yang, S.3
-
23
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
DOI 10.1016/j.jnca.2005.06.002, PII S1084804505000433, Network and Information Security: A Computational Intelligence Approach
-
T. Ozyer, R. Alhajj, K. Barker, Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening, Journal of Network and Computer Applications 30 (2007) 99-113. (Pubitemid 44666485)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
24
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
-
S. Peddabachigari, A. Abraham, C. Grosan, J. Thomas, Modeling intrusion detection system using hybrid intelligent systems, Journal of Network and Computer Applications 30 (2007) 114-132. (Pubitemid 44666486)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
25
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
DOI 10.1016/j.ins.2007.03.025, PII S0020025507001648
-
T. Shon, X. Kovah, J. Moon, A hybrid machine learning approach to network anomaly detection. Information Sciences 177 (2007) 3799-3821. (Pubitemid 46978336)
-
(2007)
Information Sciences
, vol.177
, Issue.18
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
26
-
-
33748619234
-
Applying genetic algorithm for classifying anomalous TCP/IP packets
-
DOI 10.1016/j.neucom.2006.01.023, PII S0925231206000907, Brain Inspired Cognitive Systems Selected papers from the 1st International Conference on Brain Inspired Cognitive Systems (BICS 2004)
-
T. Shon, X. Kovah, J. Moon, Applying genetic algorithm for classifying anomalous TCP/IP packets, Neurocomputing 69 (2006) 2429-2433. (Pubitemid 44375533)
-
(2006)
Neurocomputing
, vol.69
, Issue.16-18
, pp. 2429-2433
-
-
Shon, T.1
Kovah, X.2
Moon, J.3
-
27
-
-
43249119791
-
An efficient k-means clustering algorithm
-
K.R. Zalik, An efficient k-means clustering algorithm, Pattern Recognition Letter 29 (2008) 1385-1391.
-
(2008)
Pattern Recognition Letter
, vol.29
, pp. 1385-1391
-
-
Zalik, K.R.1
-
28
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
M.A., IEEE Computer Society Press
-
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, M.A., Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation, in: Proceedings 2000 DARPA Information Survivability Conference and Exposition, IEEE Computer Society Press, 2000, pp. 12-26.
-
(2000)
Proceedings 2000 DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
29
-
-
0027580356
-
Very simple classification rules perform well on most commonly used datasets
-
R.C. Holt, Very simple classification rules perform well on most commonly used datasets, Machine Learning 11 (1993) 69-90.
-
(1993)
Machine Learning
, vol.11
, pp. 69-90
-
-
Holt, R.C.1
-
30
-
-
0027580356
-
Very Simple Classification Rules Perform Well on Most Commonly Used Datasets
-
C. Robert Holte., Very Simple Classification Rules Perform Well on Most Commonly Used Datasets, Machine Learning 11(1993)63-91.
-
(1993)
Machine Learning
, vol.11
, pp. 63-91
-
-
Robert Holte, C.1
-
31
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, S. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information System Security 3(4) (2000) 227-261.
-
(2000)
ACM Transactions on Information System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
33
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S.J. Horng, M.Y. Su, Y.H. Chen, T.W. Kao, R.J. Chen, J.L. Lai, C.D. Perkasa, A novel intrusion detection system based on hierarchical clustering and support vector machines, Expert Systems with Applications 380) (2010) 306-313.
-
(2010)
Expert Systems with Applications
, vol.380
, pp. 306-313
-
-
Horng, S.J.1
Su, M.Y.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
Perkasa, C.D.7
-
34
-
-
40849099949
-
Design of multiple level hybrid classifier for intrusion detection system using bayesian clustering and decision tree
-
C. Xiang, P.C. Yong, L.S. Meng, Design of multiple level hybrid classifier for intrusion detection system using bayesian clustering and decision tree, Pattern Recognition Letters 29(2008) 918-924.
-
(2008)
Pattern Recognition Letters
, vol.29
, pp. 918-924
-
-
Xiang, C.1
Yong, P.C.2
Meng, L.S.3
-
35
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
DOI 10.1016/j.comcom.2007.05.002, PII S0140366407001855
-
A.N. Toosi, M. Kahani, A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers, Computer Communications, 30 (10) (2007) 2201-2212. (Pubitemid 47094963)
-
(2007)
Computer Communications
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
|