메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Anomaly detection using Support Vector Machine classification with k-Medoids clustering

Author keywords

Anomaly Detection; k medoids Clustering; Na ve Bayes Classification; Support Vector Machine

Indexed keywords

ANOMALY BASED INTRUSION DETECTION SYSTEMS; ANOMALY DETECTION; BAYES CLASSIFICATION; CLASSIFICATION SCHEME; CLUSTERING TECHNIQUES; DETECTION RATES; FALSE POSITIVE RATES; HIGH QUALITY; HYBRID APPROACH; K-MEANS; K-MEDOIDS; K-MEDOIDS CLUSTERING; LEARNING METHODS; NEW APPROACHES; SUPPORT VECTOR MACHINE CLASSIFICATION;

EID: 84873558396     PISSN: 21570647     EISSN: 2157068X     Source Type: Conference Proceeding    
DOI: 10.1109/AHICI.2012.6408446     Document Type: Conference Paper
Times cited : (53)

References (21)
  • 3
    • 78651541204 scopus 로고    scopus 로고
    • Applying knowledge discovery in database techniques in modeling packet header anomaly intrusion detection systems
    • Solahuddin
    • Solahuddin, "Applying Knowledge Discovery in Database Techniques in Modeling Packet Header Anomaly Intrusion Detection Systems", Journal of Software, 3 (9): 68-76, 2008.
    • (2008) Journal of Software , vol.3 , Issue.9 , pp. 68-76
  • 5
    • 34247636165 scopus 로고    scopus 로고
    • Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
    • DOI 10.1016/j.patcog.2006.12.009, PII S0031320306005218
    • C.H. Tsang, S. Kwong, and H. Wang, "Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection," Pattern Recognition, 40:2373-2391, 2007 (Pubitemid 46669583)
    • (2007) Pattern Recognition , vol.40 , Issue.9 , pp. 2373-2391
    • Tsang, C.-H.1    Kwong, S.2    Wang, H.3
  • 6
    • 68949161842 scopus 로고    scopus 로고
    • A triangle area-based nearest neighbors approach to intrusion detection
    • C. F. Tsai, and C.Y Lin, "A Triangle Area-Based Nearest Neighbors Approach to Intrusion Detection," Pattern Recognition, 43(1), 2010.
    • (2010) Pattern Recognition , vol.43 , Issue.1
    • Tsai, C.F.1    Lin, C.Y.2
  • 7
    • 36549085110 scopus 로고    scopus 로고
    • An active learning based TCM-KNN algorithm for supervised network intrusion detection
    • DOI 10.1016/j.cose.2007.10.002, PII S0167404807001101
    • Y. Li and L. Guo, "An Active Learning Based on TCM-KNN Algorithm for Supervised Network Intrusion", Computer and Securtiy, 26: 459- 467, 2007 (Pubitemid 350191973)
    • (2007) Computers and Security , vol.26 , Issue.7-8 , pp. 459-467
    • Li, Y.1    Guo, L.2
  • 11
    • 81855197007 scopus 로고    scopus 로고
    • An efficient intrusion detection system based on support vector machines and gradually feature removal method
    • January
    • Yinhui Li, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, Kuobin Dai, "An efficient intrusion detection system based on support vector machines and gradually feature removal method", Expert Systems with Applications, v 39, n 1, p 424-430, January 2012.
    • (2012) Expert Systems with Applications , vol.39 , Issue.1 , pp. 424-430
    • Li, Y.1    Xia, J.2    Zhang, S.3    Yan, J.4    Ai, X.5    Dai, K.6
  • 12
    • 84863012506 scopus 로고    scopus 로고
    • An intrusion detection approach using SVM and multiple kernel method
    • January
    • Yuping Li , Weidong Li, Guoqiang Wu, "An Intrusion Detection Approach Using SVM and Multiple Kernel Method", International Journal of Advancements in Computing Technology, v 4, n 1, p 463-469, January 2012.
    • (2012) International Journal of Advancements in Computing Technology , vol.4 , Issue.1 , pp. 463-469
    • Li, Y.1    Li, W.2    Wu, G.3
  • 13
    • 77952524606 scopus 로고    scopus 로고
    • Computational complexity between k-means and k-medoids clustering algorithms for normal and uniform distributions of data points
    • T. Velmurugan and T. Santhanam, "Computational Complexity between k-Means and k-Medoids Clustering Algorithms for Normal and Uniform Distributions of Data Points", Journal of Computer Science, 6 (3): 363- 368, 2010.
    • (2010) Journal of Computer Science , vol.6 , Issue.3 , pp. 363-368
    • Velmurugan, T.1    Santhanam, T.2
  • 15
    • 33750514606 scopus 로고    scopus 로고
    • Modeling intrusion detection system using hybrid intelligent systems
    • DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
    • Peddabachigiri, S., A. Abraham, C. Grosan and J. Thomas, "Modeling Intrusion Detection System using Hybrid Intelligent Systems", J. Network Comput. Appl., 30: 114-132, 2007. (Pubitemid 44666486)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 114-132
    • Peddabachigari, S.1    Abraham, A.2    Grosan, C.3    Thomas, J.4
  • 16
    • 33845519499 scopus 로고    scopus 로고
    • Comparison of SVM and some older classification algorithms in text classification tasks
    • DOI 10.1007/978-0-387-34747-9-18, Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
    • Fabrice Colas and Pavel Brazdil, "Comparison of SVM and Some Older Classification Algorithms in Text Classification Tasks", Proceedings - IFIP AI Proceeding, pp.169-178, 2006. (Pubitemid 44920580)
    • (2006) IFIP International Federation for Information Processing , vol.217 , pp. 169-178
    • Colas, F.1    Brazdil, P.2
  • 19
    • 84873528396 scopus 로고    scopus 로고
    • Trafic Data from Kyoto University's Honeypots
    • Trafic Data from Kyoto University's Honeypots. http://www.takakura.com/ Kyotodata/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.