메뉴 건너뛰기




Volumn 26, Issue 7, 2013, Pages 1731-1740

GMDH-based networks for intelligent intrusion detection

Author keywords

Feature ranking; GMDH; Machine learning; Network intrusion detection

Indexed keywords

CLASSIFICATION TECHNIQUE; FEATURE RANKING; GMDH; INDUCTIVE LEARNING; INTELLIGENT CLASSIFICATION; INTRUSION DETECTION SCHEME; NETWORK INTRUSION DETECTION; NEURAL NETWORK MODEL;

EID: 84878107136     PISSN: 09521976     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.engappai.2013.03.008     Document Type: Article
Times cited : (47)

References (41)
  • 1
    • 28744437197 scopus 로고    scopus 로고
    • GMDH-based feature ranking and selection for improved classification of medical data
    • DOI 10.1016/j.jbi.2005.03.003, PII S153204640500033X
    • R. Abdel-Aal GMDH-based feature ranking and selection for improved classification of medical data J. Biomed. Inf. 38 6 2005 456 468 (Pubitemid 41758095)
    • (2005) Journal of Biomedical Informatics , vol.38 , Issue.6 , pp. 456-468
    • Abdel-Aal, R.E.1
  • 2
    • 43549109105 scopus 로고    scopus 로고
    • Abductive networks for two-group classification a comparison with neural networks
    • A. Agarwal Abductive networks for two-group classification a comparison with neural networks J. Appl. Bus. Res. 15 1999 1 12
    • (1999) J. Appl. Bus. Res. , vol.15 , pp. 1-12
    • Agarwal, A.1
  • 7
    • 16244423656 scopus 로고    scopus 로고
    • Comparative experiments on learning information extractors for proteins and their interactions
    • DOI 10.1016/j.artmed.2004.07.016, Information Extraction and Summarization from Medical Documents
    • R. Bunescu, R. Ge, R. Kate, E. Marcotte, and R. Mooney Comparative experiments on learning information extractors for proteins and their interactions Artif. Intell. Med. 33 2 2005 139 155 (Pubitemid 40462453)
    • (2005) Artificial Intelligence in Medicine , vol.33 , Issue.2 , pp. 139-155
    • Bunescu, R.1    Ge, R.2    Kate, R.J.3    Marcotte, E.M.4    Mooney, R.J.5    Ramani, A.K.6    Wong, Y.W.7
  • 9
    • 40649104787 scopus 로고    scopus 로고
    • Attack characterization and intrusion detection using an ensemble of self-organizing maps
    • DeLooze, L.; 2006. Attack characterization and intrusion detection using an ensemble of self-organizing maps. In: Proceedings of the IEEE Information Assurance Workshop.
    • (2006) Proceedings of the IEEE Information Assurance Workshop
    • Delooze, L.1
  • 10
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
    • O. Depren, M. Topallar, E. Anarim, and M. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Syst. Appl. 29 4 2005 713 722 (Pubitemid 41394445)
    • (2005) Expert Systems with Applications , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 11
    • 34250185435 scopus 로고    scopus 로고
    • Neural networks learning improvement using the k-means clustering algorithm to detect network intrusions
    • K. Faraoun, and A. Boukelif Neural networks learning improvement using the k-means clustering algorithm to detect network intrusions Int. J. Comput. Intell. 3 2 2006 161 168
    • (2006) Int. J. Comput. Intell. , vol.3 , Issue.2 , pp. 161-168
    • Faraoun, K.1    Boukelif, A.2
  • 12
    • 0343624610 scopus 로고
    • The GMDH algorithm of Ivakhnenko
    • S.J. Farlow The GMDH algorithm of Ivakhnenko Am. Stat. 35 1981 210 215
    • (1981) Am. Stat. , vol.35 , pp. 210-215
    • Farlow, S.J.1
  • 15
    • 0001373628 scopus 로고
    • Random neural networks with negative and positive signals and product form solution
    • E. Gelenbe Random neural networks with negative and positive signals and product form solution Neural Comput. 1 4 1989 502 510
    • (1989) Neural Comput. , vol.1 , Issue.4 , pp. 502-510
    • Gelenbe, E.1
  • 16
    • 0000145931 scopus 로고
    • Stability of the random neural network model
    • E. Gelenbe Stability of the random neural network model Neural Comput. 2 2 1990 239 247
    • (1990) Neural Comput. , vol.2 , Issue.2 , pp. 239-247
    • Gelenbe, E.1
  • 19
    • 0001784588 scopus 로고
    • Group method of data handling - A rival of the method of stochastic approximation
    • A. Ivakhnenko Group method of data handling - a rival of the method of stochastic approximation Sov. Autom. Control 13 1966 43 71
    • (1966) Sov. Autom. Control , vol.13 , pp. 43-71
    • Ivakhnenko, A.1
  • 22
    • 1642482061 scopus 로고    scopus 로고
    • Assessing the rental value of residential properties an abductive learning networks approach
    • K.S. Kim, and W.A. Nelson Assessing the rental value of residential properties an abductive learning networks approach J. R. Estate Res. 12 1 1996 63 77
    • (1996) J. R. Estate Res. , vol.12 , Issue.1 , pp. 63-77
    • Kim, K.S.1    Nelson, W.A.2
  • 26
    • 0003086646 scopus 로고
    • Abductive reasoning networks
    • G. Montgomery, and K. Drake Abductive reasoning networks Neurocomputing 2 1991 97 104
    • (1991) Neurocomputing , vol.2 , pp. 97-104
    • Montgomery, G.1    Drake, K.2
  • 28
    • 35648969617 scopus 로고    scopus 로고
    • A denial of service detector based on maximum likelihood detection and the random neural network
    • G. Oke, and G. Loukas A denial of service detector based on maximum likelihood detection and the random neural network Comput. J. 50 6 2007 717
    • (2007) Comput. J. , vol.50 , Issue.6 , pp. 717
    • Oke, G.1    Loukas, G.2
  • 35
    • 85012240666 scopus 로고    scopus 로고
    • Data mining-based intrusion detectors an overview of the columbia IDS project
    • S.J. Stolfo, W. Lee, P.K. Chan, W. Fan, and E. Eskin Data mining-based intrusion detectors an overview of the columbia IDS project ACM SIGMOD Record 30 4 2001 5 14
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 5-14
    • Stolfo, S.J.1    Lee, W.2    Chan, P.K.3    Fan, W.4    Eskin, E.5
  • 38
    • 77956394469 scopus 로고    scopus 로고
    • Machine Learning Group, University of Waikato
    • WEKA Data Mining Software, Machine Learning Group, University of Waikato Available at: 〈 http://www.cs.waikato.ac.nz/ml/weka/index. html âŒ.
    • WEKA Data Mining Software
  • 40
    • 49549120416 scopus 로고    scopus 로고
    • An adaptive automatically tuning intrusion detection system
    • Z. Yu, J. Tsai, and T. Weigert An adaptive automatically tuning intrusion detection system ACM Trans. Auton. Adapt. Syst. 3 2008 10:1 10:25
    • (2008) ACM Trans. Auton. Adapt. Syst. , vol.3 , pp. 101-1025
    • Yu, Z.1    Tsai, J.2    Weigert, T.3
  • 41
    • 82155167665 scopus 로고    scopus 로고
    • Distributed intrusion detection system in a multi-layer network architecture of smart grids
    • Y. Zhang, L. Wang, W. Sun, R.C.G. II, and M. Alam Distributed intrusion detection system in a multi-layer network architecture of smart grids IEEE Trans. Smart Grid 2 2011 796 808
    • (2011) IEEE Trans. Smart Grid , vol.2 , pp. 796-808
    • Zhang, Y.1    Wang, L.2    Sun, W.3    Ii, R.C.G.4    Alam, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.