메뉴 건너뛰기




Volumn 36, Issue 2, 2013, Pages 829-842

Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks

Author keywords

Business intelligence; e commerce; Fuzzy association rules; Intrusion detection; Intrusion prevention

Indexed keywords

ATTACK PATTERNS; BUFFER OVERFLOWS; BUSINESS POLICIES; CLASSIFICATION ACCURACY; DATA SET; DECISION OUTCOME; E-COMMERCE APPLICATIONS; FALSE ALARM RATE; FEATURES SELECTION; FUZZY ASSOCIATION RULE; INCREASING SENSITIVITIES; INTRUSION PREVENTION; NETWORK-BASED INTRUSION DETECTION; PATTERNS MATCHING; PREDICTION RATE; RANDOM FORESTS; SAMPLE SIZES; SECURITY ADMINISTRATOR; SECURITY PROTECTION; SQL INJECTION; WEB APPLICATION ATTACKS;

EID: 84874750531     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.11.006     Document Type: Article
Times cited : (22)

References (34)
  • 5
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman Random forests Machine Learning 45 1 2001 5 32
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 6
    • 84866485165 scopus 로고    scopus 로고
    • Policy-enhanced ANFIS model to counter SOAP-related attacks
    • Chan GY, Lee CS, Heng SH. Policy-enhanced ANFIS model to counter SOAP-related attacks. knowledge-based systems 2012;35:64-76
    • (2012) Knowledge-based Systems , vol.35 , pp. 64-76
    • Chan, G.Y.1    Lee, C.S.2    Heng, S.H.3
  • 11
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive intrusion detection: A data mining approach
    • W. Lee, S.J. Stolfo, and K.W. Mok Adaptive intrusion detection: a data mining approach Artificial Intelligence Review 14 6 2000 533 567
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 14
    • 33845548325 scopus 로고    scopus 로고
    • Attacking and defending web services
    • Lindstrom P. Attacking and defending web services. A spire research report. Available from: 〈http://www.forumsys.com/resources/resources/ whitepapers/Attacking-and-Defending-WS.pdf〉; 2004.
    • (2004) A Spire Research Report
    • Lindstrom, P.1
  • 17
    • 33750512162 scopus 로고    scopus 로고
    • Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
    • T. Ozyer, R. Alhajj, and K. Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening Journal of Network and Computer Applications 30 1 2007 99 113
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 99-113
    • Ozyer, T.1    Alhajj, R.2    Barker, K.3
  • 19
    • 79151480916 scopus 로고    scopus 로고
    • S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within web services environments
    • C.I. Pinzón, J. Bajo, J.F. De Paz, and J.M. Corchado S-MAS: an adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within web services environments Expert Systems with Applications 38 2011 5486 5499
    • (2011) Expert Systems with Applications , vol.38 , pp. 5486-5499
    • Pinzón, C.I.1    Bajo, J.2    De Paz, J.F.3    Corchado, J.M.4
  • 20
    • 79952059044 scopus 로고    scopus 로고
    • Misuse detection using hybrid of association rule mining and connectionist modeling
    • [special Issue of Computer and IT]
    • M. Sheikhan, and Z. Jadidi Misuse detection using hybrid of association rule mining and connectionist modeling World Applied Sciences Journal 7 2009 31 37 [special Issue of Computer and IT]
    • (2009) World Applied Sciences Journal , vol.7 , pp. 31-37
    • Sheikhan, M.1    Jadidi, Z.2
  • 21
    • 84861522257 scopus 로고    scopus 로고
    • Misuse detection based on feature selection by fuzzy association rule mining
    • [special Issue of Computer and Electrical Engineering]
    • M. Sheikhan, and M.S. Rad Misuse detection based on feature selection by fuzzy association rule mining World Applied Sciences Journal 10 2010 32 40 [special Issue of Computer and Electrical Engineering]
    • (2010) World Applied Sciences Journal , vol.10 , pp. 32-40
    • Sheikhan, M.1    Rad, M.S.2
  • 22
    • 79251595062 scopus 로고    scopus 로고
    • Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
    • M.Y. Su Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification Journal of Network and Computer Applications 34 2 2011 722 730
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.2 , pp. 722-730
    • Su, M.Y.1
  • 28
    • 84874705082 scopus 로고    scopus 로고
    • Downloaded in December
    • WEKA software weka-3-6-4jre.exe. 〈http://www.cs.waikato.ac.nz/ml/ weka/〉. Downloaded in December 2010.
    • (2010) WEKA Software weka-3-6-4jre.exe
  • 30
    • 77954348690 scopus 로고    scopus 로고
    • Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list
    • Y. Ye, T. Li, K. Huang, Q. Jiang, and Y. Chen Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list Journal of Intelligent Information Systems 35 1 2010 1 20
    • (2010) Journal of Intelligent Information Systems , vol.35 , Issue.1 , pp. 1-20
    • Ye, Y.1    Li, T.2    Huang, K.3    Jiang, Q.4    Chen, Y.5
  • 34
    • 84874701763 scopus 로고    scopus 로고
    • wsKnight. Downloaded in July 2008
    • wsKnight. 〈http://net-square.com/wschess/index.html〉. Downloaded in July 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.