-
1
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha and J. M. Park. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12):3448-3470, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
2
-
-
79251595062
-
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
-
March
-
M.-Y. Su. Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification. J. Netw. Comput. Appl., 34(2):722-730, March 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.2
, pp. 722-730
-
-
Su, M.-Y.1
-
3
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
July
-
A. N. Toosi and M. Kahani. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput. Commun., 30(10):2201-2212, July 2007.
-
(2007)
Comput. Commun.
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
-
7
-
-
77955847605
-
Toward credible evaluation of anomaly-based intrusion-detection methods
-
sept.
-
M. Tavallaee, N. Stakhanova, and A. Ghorbani. Toward credible evaluation of anomaly-based intrusion-detection methods. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 40(5):516-524, sept. 2010.
-
(2010)
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
, vol.40
, Issue.5
, pp. 516-524
-
-
Tavallaee, M.1
Stakhanova, N.2
Ghorbani, A.3
-
9
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
-
K. Leung and C. Leckie. Unsupervised anomaly detection in network intrusion detection using clusters. In Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38, pages 333-342, Darlinghurst, Australia, Australia, 2005. Australian Computer Society, Inc.
-
(2005)
Proceedings of the Twenty-eighth Australasian Conference on Computer Science
, vol.38
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
10
-
-
79952932462
-
NADO: Network anomaly detection using outlier approach
-
New York, NY, USA, ACM
-
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita. NADO: network anomaly detection using outlier approach. In Proceedings of the International Conference on Communication, Computing & Security, pages 531-536, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the International Conference on Communication, Computing & Security
, pp. 531-536
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
11
-
-
33644860127
-
A clustering-based method for unsupervised intrusion detections
-
May
-
S. Jiang, X. Song, H. Wang, J.-J. Han, and Q.-H. Li. A clustering-based method for unsupervised intrusion detections. Pattern Recogn. Lett., 27(7):802-810, May 2006.
-
(2006)
Pattern Recogn. Lett.
, vol.27
, Issue.7
, pp. 802-810
-
-
Jiang, S.1
Song, X.2
Wang, H.3
Han, J.-J.4
Li, Q.-H.5
-
13
-
-
84858698273
-
Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
-
Jan
-
P. Casas, J. Mazel, and P. Owezarski. Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Computer Communications, Jan 2012.
-
(2012)
Computer Communications
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
14
-
-
2442611856
-
Stability-based validation of clustering solutions
-
June
-
T. Lange, V. Roth, M. L. Braun, and J. M. Buhmann. Stability-based validation of clustering solutions. Neural Comput., 16(6):1299-1323, June 2004.
-
(2004)
Neural Comput.
, vol.16
, Issue.6
, pp. 1299-1323
-
-
Lange, T.1
Roth, V.2
Braun, M.L.3
Buhmann, J.M.4
-
15
-
-
33746099301
-
A sober look at clustering stability
-
S. Ben-David, U. v. Luxburg, and D. Pál. A sober look at clustering stability. In COLT, pages 5-19, 2006.
-
(2006)
COLT
, pp. 5-19
-
-
Ben-David, S.1
Luxburg, U.V.2
Pál, D.3
-
17
-
-
0035676057
-
On clustering validation techniques
-
December
-
M. Halkidi, Y. Batistakis, and M. Vazirgiannis. On clustering validation techniques. J. Intell. Inf. Syst., 17(2-3):107-145, December 2001.
-
(2001)
J. Intell. Inf. Syst.
, vol.17
, Issue.2-3
, pp. 107-145
-
-
Halkidi, M.1
Batistakis, Y.2
Vazirgiannis, M.3
-
18
-
-
84866086336
-
An ensemble method for validation of cluster analysis
-
September
-
S. Jun. An ensemble method for validation of cluster analysis. International Journal of Computer Science Issues, 8(6):26-30, September 2011.
-
(2011)
International Journal of Computer Science Issues
, vol.8
, Issue.6
, pp. 26-30
-
-
Jun, S.1
-
19
-
-
79956097533
-
Mutual information-based feature selection for intrusion detection systems
-
F. Amiri, M. M. R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani. Mutual information-based feature selection for intrusion detection systems. Journal of Network and Computer Applications, 34(4):1184-1199, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1184-1199
-
-
Amiri, F.1
Yousefi, M.M.R.2
Lucas, C.3
Shakery, A.4
Yazdani, N.5
-
20
-
-
84941155240
-
Well separated clusters and optimal fuzzy partitions
-
J. Dunn. Well separated clusters and optimal fuzzy partitions. Journal of Cybernetics, 4:95-104, 1974.
-
(1974)
Journal of Cybernetics
, vol.4
, pp. 95-104
-
-
Dunn, J.1
-
23
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
P. J. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics, 20(1):53-65, 1987.
-
(1987)
Journal of Computational and Applied Mathematics
, vol.20
, Issue.1
, pp. 53-65
-
-
Rousseeuw, P.J.1
-
25
-
-
78649934709
-
-
University of California, School of Information and Computer Sciences, Irvine, CA
-
A. Frank and A. Asuncion. UCI Machine Learning Repository [http://archive.ics.uci.edu/ml], 2010. University of California, School of Information and Computer Sciences, Irvine, CA.
-
(2010)
UCI Machine Learning Repository
-
-
Frank, A.1
Asuncion, A.2
-
26
-
-
84866074543
-
-
TUIDS12. May04
-
TUIDS12. TUIDS network intrusion datasets. http://tezu.ernet.in/~dkb/ resource.html,May04,2012.
-
(2012)
TUIDS Network Intrusion Datasets
-
-
-
27
-
-
79952963997
-
-
October 28
-
KDDCUP99. Winning strategy in KDD99. http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html, October 28 1999.
-
(1999)
Winning Strategy in KDD99
-
-
-
28
-
-
79952952185
-
Critical study of supervised learning techniques in predicting attacks
-
R. Beghdad. Critical study of supervised learning techniques in predicting attacks. Information Security Journal: A Global Perspective, 19(1):22-35, 2010.
-
(2010)
Information Security Journal: A Global Perspective
, vol.19
, Issue.1
, pp. 22-35
-
-
Beghdad, R.1
-
29
-
-
68949161842
-
A triangle area based nearest neighbors approach to intrusion detection
-
January
-
C.-F. Tsai and C.-Y. Lin. A triangle area based nearest neighbors approach to intrusion detection. Pattern Recogn., 43(1):222-229, January 2010.
-
(2010)
Pattern Recogn.
, vol.43
, Issue.1
, pp. 222-229
-
-
Tsai, C.-F.1
Lin, C.-Y.2
-
30
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
January
-
S. J. Horng, M. Y. Su, Y. H. Chen, T. W. Kao, R. J. Chen, J. L. Lai, and C. D. Perkasa. A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl., 38(1):306-313, January 2011.
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.J.1
Su, M.Y.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
Perkasa, C.D.7
|