메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1669-1675

Weighted feature extraction using a genetic algorithm for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; FEATURE EXTRACTION; GENETIC ALGORITHMS;

EID: 84870480277     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CEC.2003.1299873     Document Type: Conference Paper
Times cited : (26)

References (18)
  • 1
    • 84898944587 scopus 로고    scopus 로고
    • Intrusion detection with neural networks
    • Michael I. Jordan, Michael J. Kearns, and Sara A. Sok Eds ., TheMITPress
    • Jake Ryan, Meng-Jang Lin, and Risto Miikkulainen, "Intrusion detection with neural networks". in Advatices in Neural Itfarniation Processing Systems, Michael I. Jordan, Michael J. Kearns, and Sara A. Sok Eds . 1998, vol. 10, pp. 943-949, TheMITPress.
    • (1998) Advatices in Neural Itfarniation Processing Systems , vol.10 , pp. 943-949
    • Ryan, J.1    Lin, M.-J.2    Miikkulainen, R.3
  • 4
    • 0031078007 scopus 로고    scopus 로고
    • Feature selection: Evaluation, application, and small sample performance
    • February
    • Anil Jain and Douglas Zongker, "Feature selection: Evaluation, application, and small sample performance", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 2, pp. 153-158, February 1997.
    • (1997) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.19 , Issue.2 , pp. 153-158
    • Jain, A.1    Zongker, D.2
  • 8
    • 0034227313 scopus 로고    scopus 로고
    • Dimensionality reduction using genetic algorithms
    • July
    • M. L. Raymer, W. F. Punch, E. D. Goodman, L. A. Kuhn. and A. K. Jain, "Dimensionality reduction using genetic algorithms", IEEE-EC, vol. 4, no. 2, pp. 164, July 2000.
    • (2000) IEEE-EC , vol.4 , Issue.2 , pp. 164
    • Raymer, M.L.1    Punch, W.F.2    Goodman, E.D.3    Kuhn, L.A.4    Jain, A.K.5
  • 10
    • 33845310391 scopus 로고    scopus 로고
    • Genetic algorithm optimized feature transformation A comparison with different classifiers
    • E. Cantu-Paz, J. A. Foster, K. Deb, D. Davis, R. Roy, U.-M. O'Reilly, H.-G. Beyer, R. Standish, G. Kendall, S. Wilson, M. Harman, J. Wegener, D. Dasgupta, M. A. Potter. A. C. Schultz, K. Dows1and.N. Jonoska, and J. Miller, Eds. Chicago. 12-16 July, vol. 2724 0f LNCS, Springer-Verlag
    • Z. Huang, M. Pei, E. Goodman, Y. Huang, and G. Li, "Genetic algorithm optimized feature transformation A comparison with different classifiers", in Genetic arid Evolutionary Computation - GECCO-2003, E. Cantu-Paz, J. A. Foster, K. Deb, D. Davis, R. Roy, U.-M. O'Reilly, H.-G. Beyer, R. Standish, G. Kendall, S. Wilson, M. Harman, J. Wegener, D. Dasgupta, M. A. Potter. A. C. Schultz, K. Dows1and.N. Jonoska, and J. Miller, Eds., Chicago. 12-16 July 2003. vol. 2724 0f LNCS, pp2121-2133, Springer-Verlag.
    • (2003) Genetic Arid Evolutionary Computation - GECCO-2003 , pp. 2121-2133
    • Huang, Z.1    Pei, M.2    Goodman, E.3    Huang, Y.4    Li, G.5
  • 11
    • 0029359427 scopus 로고
    • A genetic approach for selection of (near-) optimal suhsets of principal components for discrimination
    • M. Prakash and M. Narasimha Murty. "A genetic approach for selection of (near-) optimal suhsets of principal components for discrimination". Patteni Recognition Letters, vol. 16, no. 8, pp. 781-787, 1995.
    • (1995) Patteni Recognition Letters , vol.16 , Issue.8 , pp. 781-787
    • Prakash, M.1    Murty, M.N.2
  • 12
    • 85084160262 scopus 로고    scopus 로고
    • Using text categorization techniques for intrusion detection
    • Berkeley, CA, USA, August 5-9, USENIX Association
    • Y. Liao and V. Rao Vemuri, "Using text categorization techniques for intrusion detection", in Proceedings of the 11th USENIX Security Symposium (SECURITY- 02). Berkeley, CA, USA, August 5-9 2002, pp. 51- 60, USENIX Association.
    • (2002) Proceedings of the 11th USENIX Security Symposium (SECURITY- 02) , pp. 51-60
    • Liao, Y.1    Vemuri, V.R.2
  • 13
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-nearest neighhor classifier for intrusion detection
    • Y. Liao and V. Rao Vemuri, "Use of K-nearest neighhor classifier for intrusion detection", Computers & Securig, vol. 21, no. 5, pp. 419-448.2002.
    • (2002) Computers & Securig , vol.21 , Issue.5 , pp. 419-448
    • Liao, Y.1    Vemuri, V.R.2
  • 15
    • 84875961249 scopus 로고    scopus 로고
    • The UCI KDD Archive, Information and Computer Science, Irvine, Last accessed: 7/7/03
    • The UCI KDD Archive, Information and Computer Science, University of California, Irvine, "Kdd cup 1999 data set http://kdd.ics.uci.edu/ datahases/kddcup99/kddcup9Y.html", Last accessed: 7/7/03.
    • Kdd Cup 1999 Data Set
  • 16
    • 0003993827 scopus 로고    scopus 로고
    • Last accessed: 7/7/03
    • MIT Lincoln Laboratory, "Darpa intrusion detection evaluation http://www.ll.mit.edu/ist/ideval/index.html, Last accessed: 7/7/03.
    • Darpa Intrusion Detection Evaluation
  • 17
    • 84962238645 scopus 로고    scopus 로고
    • Cost-based modeling for fraud and intrusion detection: Results from the JAM project
    • IEEE Computer Press
    • Salvatore Stolfo, Wenke Lee, Andreas Prodromidis, and Philip Chan, "Cost-based modeling for fraud and intrusion detection: Results from the JAM project", in Proc. DA RPA lriforniarion Survivabilih Conference arid Exposirion. 2000, vol. 11, pp. 1130-1144, IEEE Computer Press.
    • (2000) Proc. da RPA Lriforniarion Survivabilih Conference Arid Exposirion , vol.11 , pp. 1130-1144
    • Stolfo, S.1    Lee, W.2    Prodromidis, A.3    Chan, P.4
  • 18
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok, "'A data mining framework for building intrusion detection models", in IEEE Simposium on Securig and Privacy, 1999, pp. 120-132.
    • (1999) IEEE Simposium on Securig and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.