메뉴 건너뛰기




Volumn 30, Issue , 2012, Pages 1-9

A hybrid intelligent approach for network intrusion detection

Author keywords

Decision tree; hybrid approach; Intrusion detection system; PCA; Radial Basis function; sPegasis

Indexed keywords

HYBRID APPROACH; INTRUSION DETECTION SYSTEM; PCA; RADIAL BASIS FUNCTION; SPEGASIS;

EID: 84859059506     PISSN: 18777058     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.proeng.2012.01.827     Document Type: Conference Paper
Times cited : (133)

References (26)
  • 3
    • 24944559226 scopus 로고    scopus 로고
    • Building an Intrusion detection system based on SVM and genetic algorithm
    • proceedings
    • Chen RC, Chen J, Chen TS, Hsieh C, Chen TY and Wu KK, "Building an Intrusion detection system based on SVM and genetic algorithm", In: Advances in NN-ISNN 2005, pt 3, proceedings, 2005; 3498:409-14.
    • (2005) Advances in NN-ISNN 2005 , vol.3498 , Issue.PART 3 , pp. 409-414
    • Chen, R.C.1    Chen, J.2    Chen, T.S.3    Hsieh, C.4    Chen, T.Y.5    Wu, K.K.6
  • 4
    • 0242489523 scopus 로고    scopus 로고
    • Feature selection for intrusion detection with neural network and Support vector machines
    • Mukkamala S and Sung AH, "Feature selection for intrusion detection with neural network and Support vector machines", Transportation security infrastructure prot., 2003; 1822:33-9.
    • (2003) Transportation Security Infrastructure Prot. , vol.1822 , pp. 33-39
    • Mukkamala, S.1    Sung, A.H.2
  • 6
    • 8344251737 scopus 로고    scopus 로고
    • Comparison of back propagation learning and radial basis function network in Intrusion detection system
    • Zhang CL, Jiang J and Karnel M., "Comparison of back propagation learning and radial basis function network in Intrusion detection system", In: Rough set, fuzzy set, data mining and granular computing, 2003; 2639:466-70.
    • (2003) Rough Set, Fuzzy Set, Data Mining and Granular Computing , vol.2639 , pp. 466-470
    • Zhang, C.L.1    Jiang, J.2    Karnel, M.3
  • 7
    • 58349096877 scopus 로고    scopus 로고
    • Data Mining based intrusion detectors
    • Wu S and Yen E., "Data Mining based intrusion detectors", Expert system with applications journal 2009; 36(3):5605-12.
    • (2009) Expert System with Applications Journal , vol.36 , Issue.3 , pp. 5605-5612
    • Wu, S.1    Yen, E.2
  • 11
    • 85013603694 scopus 로고    scopus 로고
    • Mining association rules for constructing a network intrusion detection model
    • Panda M and Patra MR. Mining association rules for constructing a network intrusion detection model, International journal of applied engineering research, 2009,4(3):381-98.
    • (2009) International Journal of Applied Engineering Research , vol.4 , Issue.3 , pp. 381-398
    • Panda, M.1    Patra, M.R.2
  • 13
    • 63749120226 scopus 로고    scopus 로고
    • Network intrusion detection design using feature selection of soft computing paradigms
    • Chan TS, Yen KK and Luo J., "Network intrusion detection design using feature selection of soft computing paradigms", International journal of computational intelligence, 2008, 4(3):196-208.
    • (2008) International Journal of Computational Intelligence , vol.4 , Issue.3 , pp. 196-208
    • Chan, T.S.1    Yen, K.K.2    Luo, J.3
  • 15
    • 71649088415 scopus 로고    scopus 로고
    • A Hybrid clustering approach for network intrusion detection using cobweb and FFT
    • Panda M and Patra MR., "A Hybrid clustering approach for network intrusion detection using cobweb and FFT", Journal of Intelligent systems,2009,18(3):229-45.
    • (2009) Journal of Intelligent Systems , vol.18 , Issue.3 , pp. 229-245
    • Panda, M.1    Patra, M.R.2
  • 18
    • 76649097981 scopus 로고    scopus 로고
    • Semi Naïve Bayesian method for anomaly based network intrusion detection
    • Proc. of ICONIP 2009, Thailand
    • Panda M and Patra MR., "Semi Naïve Bayesian method for anomaly based network intrusion detection", In: Proc. of ICONIP 2009, Thailand, Lecture Notes in Computer Science,2009; 5863:614-21.
    • (2009) Lecture Notes in Computer Science , vol.5863 , pp. 614-621
    • Panda, M.1    Patra, M.R.2
  • 19
    • 84859096648 scopus 로고    scopus 로고
    • A hybrid intelligent approach for automated alert clustering and filtering in intrusion alert analysis
    • Siraj MMd, Maarof MdAand Hashim SZ Md., " A hybrid intelligent approach for automated alert clustering and filtering in intrusion alert analysis", Intl. Journal of computer theory and engineering, 2009; 1(5):539-45.
    • (2009) Intl. Journal of Computer Theory and Engineering , vol.1 , Issue.5 , pp. 539-545
    • Siraj, M.Md.1    Maarof, Md.A.2    Hashim, S.Z.Md.3
  • 23
    • 33646395091 scopus 로고    scopus 로고
    • Ensembles of balanced nested dichotomies for multiclass problems
    • Dong L, Frank E and Kramer S., "Ensembles of balanced nested dichotomies for multiclass problems", In: Proc. of PKDD, 2005, p. 84-95.
    • Proc. of PKDD, 2005 , pp. 84-95
    • Dong, L.1    Frank, E.2    Kramer, S.3
  • 25
    • 0035478854 scopus 로고    scopus 로고
    • Machine Learning
    • Breiman L. Random Forests, "Machine Learning", 2001, 45(1):5-32.
    • (2001) Random Forests , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.