메뉴 건너뛰기




Volumn 7, Issue 3, 2008, Pages 436-447

Performance analysis of soft computing based Anomaly detectors

Author keywords

Anomaly detection; False alarm rate; Fuzzy logic; Genetic algorithm; Neural network; Soft computing

Indexed keywords

ANOMALY DETECTION; ANOMALY DETECTION SYSTEMS; ANOMALY DETECTOR; FALSE ALARM RATE; FALSE POSITIVE AND FALSE NEGATIVES; NORMAL BEHAVIOR; PERFORMANCE ANALYSIS; SOFTCOMPUTING TECHNIQUES;

EID: 84870573304     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (31)
  • 1
    • 77957985073 scopus 로고    scopus 로고
    • Soft computing models for network intrusion detection system
    • ch.16, Studies in Fuzziness and Soft Computing, Springer-Verlag, May
    • A. Abraham, and R. Jain, "Soft computing models for network intrusion detection system," Soft Computing in Knowledge Discovery: Methods and Applications, ch.16, Studies in Fuzziness and Soft Computing, Springer-Verlag, May 2004.
    • (2004) Soft Computing in Knowledge Discovery: Methods and Applications
    • Abraham, A.1    Jain, R.2
  • 3
    • 0003914522 scopus 로고    scopus 로고
    • State of the Practice of Intrusion Detection Technologies, Carnegie Mellon Software Engineering Institute
    • CMU/SEI-99-TR-028
    • J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, State of the Practice of Intrusion Detection Technologies, Carnegie Mellon Software Engineering Institute, SEI Technical Report, CMU/SEI-99-TR-028, 2000.
    • (2000) SEI Technical Report
    • Allen, J.1    Christie, A.2    Fithen, W.3    McHugh, J.4    Pickel, J.5    Stoner, E.6
  • 4
  • 5
    • 0035879674 scopus 로고    scopus 로고
    • Intrusion detection through learning behavioral model
    • July 15
    • B. Balajinath and S.V. Raghavan, "Intrusion detection through learning behavioral model," Computer Communications, vol. 24, no. 12, pp. 1202-1212, July 15, 2001.
    • (2001) Computer Communications , vol.24 , Issue.12 , pp. 1202-1212
    • Balajinath, B.1    Raghavan, S.V.2
  • 8
    • 33947581868 scopus 로고    scopus 로고
    • Hybrid flexible neural-tree-based intrusion detection systems
    • Apr.
    • Y. Chen, A. Abraham, and B. Yang, "Hybrid flexible neural-tree-based intrusion detection systems," International Journal of Intelligent Systems, vol. 22, no. 4, pp. 337-352, Apr. 2007.
    • (2007) International Journal of Intelligent Systems , vol.22 , Issue.4 , pp. 337-352
    • Chen, Y.1    Abraham, A.2    Yang, B.3
  • 9
    • 2942638783 scopus 로고    scopus 로고
    • Model Generation for Intrusion Detection System using Genetic Algorithms
    • Ossining, NY, Nov. 27
    • A. Chittur, Model Generation for Intrusion Detection System using Genetic Algorithms, High School Honors Thesis, Ossining High School, Ossining, NY, Nov. 27, 2001.
    • (2001) High School Honors Thesis, Ossining High School
    • Chittur, A.1
  • 10
    • 74949104861 scopus 로고
    • Applying genetic programming to intrusion detection
    • AAAI Press, Nov
    • M. Crosbie, and E. Spafford, "Applying genetic programming to intrusion detection," Proceedings of AAAI Fall Symposium, pp. 1-8, AAAI Press, Nov. 1995.
    • (1995) Proceedings of AAAI Fall Symposium , pp. 1-8
    • Crosbie, M.1    Spafford, E.2
  • 15
    • 3142701996 scopus 로고    scopus 로고
    • Soft Computing and Intelligent Systems Design, Theory
    • Addison Wesley, Pearson Education Limited, Essex, England, Sep.
    • F. Karray, and C. W. D. Silva, Soft Computing and Intelligent Systems Design, Theory, Tools and Applications, pp. 560, Addison Wesley, Pearson Education Limited, Essex, England, Sep. 2004.
    • (2004) Tools and Applications , pp. 560
    • Karray, F.1    Silva, C.W.D.2
  • 18
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • Oakland, Canada
    • W. Lee, S. J. Stolfo, and K.W. Mok, "A data mining framework for building intrusion detection models," IEEE Security and Privacy Symposium, pp. 120-132, Oakland, Canada, 1999.
    • (1999) IEEE Security and Privacy Symposium , pp. 120-132
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 19
    • 84962260018 scopus 로고    scopus 로고
    • Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
    • IEEE Computer Society Press
    • R. P. Lippmann, et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE Computer Society Press, 2000.
    • (2000) Proceedings of the DARPA Information Survivability Conference and Exposition
    • Lippmann, R.P.1
  • 20
    • 67650418236 scopus 로고    scopus 로고
    • Detecting new forms of network intrusion using genetic programming
    • Dec. 8-12
    • W. Lu, and I. Traore, "Detecting new forms of network intrusion using genetic programming," IEEE Evolutionary Computing, vol. 3. pp. 2165-2172, Dec. 8-12, 2003.
    • (2003) IEEE Evolutionary Computing , vol.3 , pp. 2165-2172
    • Lu, W.1    Traore, I.2
  • 21
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
    • M. V. Mahoney, and P. K. Chan, "An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection," Proceedings of Recent Advances in Intrusion Detection (RAID), pp. 220-237, 2003.
    • (2003) Proceedings of Recent Advances in Intrusion Detection (RAID) , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 22
    • 84874995499 scopus 로고    scopus 로고
    • Soft Computing Techniques for Intrusion Detection, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University
    • Fair Fax
    • S. Mukkamala, and A. H. Sung, Soft Computing Techniques for Intrusion Detection, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University, ONR and AFSOR Sponsored Workshop on Intrusion Detection, Fair Fax, 2003.
    • (2003) ONR and AFSOR Sponsored Workshop on Intrusion Detection
    • Mukkamala, S.1    Sung, A.H.2
  • 23
    • 33750512162 scopus 로고    scopus 로고
    • Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
    • Jan.
    • T. Ozyer, R. Alhajj, and K. Barker, "Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening," Journal of Network and Computer Applications, vol. 30, no. 1, pp. 99-113, Jan. 2007.
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 99-113
    • Ozyer, T.1    Alhajj, R.2    Barker, K.3
  • 28
    • 34247636165 scopus 로고    scopus 로고
    • Genetic- fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
    • C. H. Tsang, S. Kwong, and H. Wang, "Genetic- fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection," Pattern Recognition, vol. 40, no. 9, pp. 2373- 2391, Sep. 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.9 , pp. 2373-2391
    • Tsang, C.H.1    Kwong, S.2    Wang, H.3
  • 29
    • 1642404668 scopus 로고    scopus 로고
    • Genetic algorithm optimization of membership functions for mining fuzzy association rules
    • Atlantic City, NJ, Feb. 27-Mar. 3
    • W.Wang, and S. M. Bridges, "Genetic algorithm optimization of membership functions for mining fuzzy association rules," Proceedings of the 7th International Conference on Fuzzy Theory & Technology, pp.131-134, Atlantic City, NJ, Feb. 27-Mar. 3, 2000.
    • (2000) Proceedings of the 7th International Conference on Fuzzy Theory & Technology , pp. 131-134
    • Wang, W.1    Bridges, S.M.2
  • 31
    • 0015558134 scopus 로고
    • Outline of a new approach to the analysis of complex systems and decision processes
    • L. A. Zadeh, "Outline of a new approach to the analysis of complex systems and decision processes," IEEE Transactions on Systems, Man, and Cybernetics, vol. 3, pp. 28-44, 1973.
    • (1973) IEEE Transactions on Systems, Man, and Cybernetics , vol.3 , pp. 28-44
    • Zadeh, L.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.