메뉴 건너뛰기




Volumn , Issue , 2013, Pages 294-299

An analysis of supervised tree based classifiers for intrusion detection system

Author keywords

Classification Models; Discretization; Feature Selection; Intrusion detection system; Random Tree

Indexed keywords

CLASSIFICATION ALGORITHM; CLASSIFICATION MODELS; DISCRETIZATIONS; INTRUSION DETECTION MODELS; INTRUSION DETECTION SYSTEMS; NETWORK INTRUSION DETECTION SYSTEMS; PATTERN RECOGNITION AND CLASSIFICATION; RANDOM TREE;

EID: 84876765564     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPRIME.2013.6496489     Document Type: Conference Paper
Times cited : (85)

References (26)
  • 1
    • 84865209539 scopus 로고    scopus 로고
    • A network intrusion detection system based on a hidden naïve bayes multiclass classifier
    • Levent Koc,Thomas A.Mazzuchi,and Shahrao.m.Sarkani, " A network intrusion detection system based on a hidden naïve bayes multiclass classifier",Expert Systems with Applications,39(18),pp.13492-13500,2012.
    • (2012) Expert Systems with Applications , vol.39 , Issue.18 , pp. 13492-13500
    • Koc, L.1    Mazzuchi, T.A.2    Sarkani, S.M.3
  • 2
    • 81855221688 scopus 로고    scopus 로고
    • Decision tree based light weight intrusion detection using a wrapper approach
    • Siva S.Sivatha Sindhu, S.Geetha and A.Kannan," Decision tree based light weight intrusion detection using a wrapper approach", Expert Systems with Applications,39(1), pp.129-141, 2012.
    • (2012) Expert Systems with Applications , vol.39 , Issue.1 , pp. 129-141
    • Sivatha Sindhu, S.S.1    Geetha, S.2    Kannan, A.3
  • 4
    • 34247636165 scopus 로고    scopus 로고
    • Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection
    • Tsang, C. H., Kwong, S., & Wang, H.," Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection", Pattern Recognition,40 (9), pp. 2373-2391, 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.9 , pp. 2373-2391
    • Tsang, C.H.1    Kwong, S.2    Wang, H.3
  • 5
    • 70449353683 scopus 로고    scopus 로고
    • Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
    • N.B. Annur, H.Sallehudin,A.Gani and O.Zakari, "Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree", Malaysian Journal of Computer Science,21(2), pp.101-115,2008.
    • (2008) Malaysian Journal of Computer Science , vol.21 , Issue.2 , pp. 101-115
    • Annur, N.B.1    Sallehudin, H.2    Gani, A.3    Zakari, O.4
  • 13
    • 0141464248 scopus 로고    scopus 로고
    • HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
    • Zhang Z, HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification", InProceedings of the IEEE Workshop on information assurance and security, pp,85-90,2001.
    • (2001) InProceedings of the IEEE Workshop on Information Assurance and Security , pp. 85-90
    • Zhang, Z.1
  • 19
    • 58349096877 scopus 로고    scopus 로고
    • Data mining based intrusion detectors
    • Wu., S & Yen.E, "Data mining based intrusion detectors", Expert SystemswithApplications,3(1),pp.5605-5612,2009.
    • (2009) Expert SystemswithApplications , vol.3 , Issue.1 , pp. 5605-5612
    • Wu, S.1    Yen, E.2
  • 20
    • 0031334221 scopus 로고    scopus 로고
    • Selection of relevant features and examples in machine learning
    • Blum, A., & Langley, P, "Selection of relevant features and examples in machine learning", Artificial Intelligence,97(1),45-271,1997.
    • (1997) Artificial Intelligence , vol.97 , Issue.1 , pp. 45-271
    • Blum, A.1    Langley, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.