메뉴 건너뛰기




Volumn 72, Issue 12, 2012, Pages 1576-1590

A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection

Author keywords

Detection accuracy; False positive rate; Growing hierarchical self organizing map; Network anomaly detection; Online adaptation

Indexed keywords

DETECTION ACCURACY; FALSE POSITIVE RATES; GROWING HIERARCHICAL SELF-ORGANIZING MAPS; NETWORK ANOMALY DETECTION; ON-LINE ADAPTATION;

EID: 84867826492     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2012.09.004     Document Type: Article
Times cited : (43)

References (38)
  • 5
    • 43249105264 scopus 로고    scopus 로고
    • An assessment of the DARPA IDS evaluation dataset using Snort
    • Davis, Department of Computer Science, Davis, CA
    • S.-T. Brugger, J. Chow, An assessment of the DARPA IDS evaluation dataset using Snort, Technical Report CSE-2007-1, University of California, Davis, Department of Computer Science, Davis, CA, 2007.
    • (2007) Technical Report CSE-2007-1, University of California
    • Brugger, S.-T.1    Chow, J.2
  • 12
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system for anomaly and misuse detection in computer networks
    • O. Depren, M. Topallar, E. Anarim, and M.K. CilizAn An intelligent intrusion detection system for anomaly and misuse detection in computer networks Expert Systems with Applications 29 2005 713 722
    • (2005) Expert Systems with Applications , vol.29 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Cilizan, M.K.4
  • 17
    • 0003704318 scopus 로고    scopus 로고
    • University of California, Irvine
    • S. Hettich, S. Bay, The UCI KDD archive, University of California, Irvine, 1999. http://kdd.ics.uci.edu.
    • (1999) The UCI KDD Archive
    • Hettich, S.1    Bay, S.2
  • 26
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by Lincoln laboratory
    • J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by Lincoln laboratory ACM Transactions on Information and System Security 3 4 2000 262 294
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 33
    • 0442296744 scopus 로고    scopus 로고
    • A Bayesian paradigm for designing intrusion detection systems
    • S.L. Scott A Bayesian paradigm for designing intrusion detection systems Computational Statistics and Data Analysis 45 2004 69 83
    • (2004) Computational Statistics and Data Analysis , vol.45 , pp. 69-83
    • Scott, S.L.1
  • 36
    • 69249230890 scopus 로고    scopus 로고
    • Intrusion detection by machine learning: A review
    • C. Tsai, Y. Hsu, C. Lin, and W. Lin Intrusion detection by machine learning: a review Expert Systems with Applications 36 10 2009 11994 12000
    • (2009) Expert Systems with Applications , vol.36 , Issue.10 , pp. 11994-12000
    • Tsai, C.1    Hsu, Y.2    Lin, C.3    Lin, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.