메뉴 건너뛰기




Volumn , Issue , 2012, Pages 256-260

Evaluation effectiveness of hybrid IDS using snort with Naïve Bayes to detect attacks

Author keywords

anomaly based detection; hybrid; Intrusion Detection Systems; na ve bayes; signature based detection; snort

Indexed keywords

ANOMALY BASED DETECTION; BAYES NET; DATA SETS; DETECTION RATES; FALSE ALARM RATE; HYBRID; INTEGRATED SIGNATURE; INTRUSION DETECTION SYSTEMS; NAIVE BAYES; NAIVE-BAYES ALGORITHM; OR-NETWORKS; SNORT; SYSTEM SECURITY;

EID: 84863697493     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DICTAP.2012.6215386     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 3
    • 73349119373 scopus 로고    scopus 로고
    • Integrating Anomaly-Based Approach into Bayesian Network Classifiers
    • S. Benferhat and K. Tabia, "Integrating Anomaly-Based Approach into Bayesian Network Classifiers," e-Business and Telecommunications, 2009, pp. 127-139.
    • (2009) e-Business and Telecommunications , pp. 127-139
    • Benferhat, S.1    Tabia, K.2
  • 5
    • 62249168871 scopus 로고    scopus 로고
    • A hybrid intrusion detection system design for computer network security
    • M. A. Aydin, et al., "A hybrid intrusion detection system design for computer network security," Computers & Electrical Engineering, vol. 35, 2009, pp. 517-526.
    • (2009) Computers & Electrical Engineering , vol.35 , pp. 517-526
    • Aydin, M.A.1
  • 6
    • 78751674819 scopus 로고    scopus 로고
    • Online Intrusion Alert Aggregation with Generative Data Stream Modeling
    • A. Hofmann and B. Sick, "Online Intrusion Alert Aggregation with Generative Data Stream Modeling," Dependable and Secure Computing, IEEE Transactions on, vol. 8, 2011, pp. 282-294.
    • (2011) Dependable and Secure Computing, IEEE Transactions on , vol.8 , pp. 282-294
    • Hofmann, A.1    Sick, B.2
  • 12
    • 84863679428 scopus 로고    scopus 로고
    • Available
    • KDD Cup 99 training data set Available: http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html. (2011).
    • (2011) KDD Cup 99 Training Data Set
  • 13
    • 84863679429 scopus 로고    scopus 로고
    • Weka Available
    • Weka. Weka Program Available: www.cs.waikato.ac.nz/ml/weka, (2011).
    • (2011) Weka Program
  • 14
    • 84863656409 scopus 로고    scopus 로고
    • M. L. Laboratory Available
    • M. L. Laboratory. DARPA dataset Available: http://www.ll.mit.edu/ (2011).
    • (2011) DARPA Dataset
  • 15
    • 58349096877 scopus 로고    scopus 로고
    • Data mining-based intrusion detectors
    • S. Y. Wu and E. Yen, "Data mining-based intrusion detectors," Expert Systems with Applications, vol. 36, pp. 5605-5612, 2009.
    • (2009) Expert Systems with Applications , vol.36 , pp. 5605-5612
    • Wu, S.Y.1    Yen, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.