메뉴 건너뛰기




Volumn 1479, Issue 1, 2012, Pages 1506-1511

The application of extreme learning machines to the network intrusion detection problem

Author keywords

intrusion detection systems; Multi layer neural network; pattern recognition

Indexed keywords


EID: 84883090850     PISSN: 0094243X     EISSN: 15517616     Source Type: Conference Proceeding    
DOI: 10.1063/1.4756450     Document Type: Conference Paper
Times cited : (9)

References (31)
  • 2
    • 84883107604 scopus 로고    scopus 로고
    • Rapid 7 Inc, accessed 24 Apr 12
    • Rapid 7 Inc, Metasploit penetration testing software, Available www. metasploit. com, accessed 24 Apr 12 (2012), URL www. metasploit. com
    • (2012) Metasploit Penetration Testing Software
  • 11
    • 83755229749 scopus 로고    scopus 로고
    • ISBN 978-3-642-04116-7 (Print) 978-3-642-04117-4 (Online
    • J. Hu, Host-Based Anomaly IDS, 2010, ISBN 978-3-642-04116-7 (Print) 978-3-642-04117-4 (Online)
    • (2010) Host-Based Anomaly IDS
    • Hu, J.1
  • 12
    • 84890861404 scopus 로고    scopus 로고
    • A multi-layer model for anomaly intrusion detection using program sequences of system calls
    • ISSN 1531-2216
    • X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls," in Networks, 2003. ICON2003. The 11th IEEE International Conference on, 2003, pp. 531-536, ISSN 1531-2216
    • (2003) Networks 2003. ICON2003. The 11th IEEE International Conference on , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 14
    • 21644438395 scopus 로고    scopus 로고
    • An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
    • vol. 2, ISSN 1531-2216
    • X. Hoang, and J. Hu, "An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls," in Networks, 2004. (ICON 2004). Proceedings. 12th IEEE International Conference on, 2004, vol. 2, pp. 470-474 vol. 2, ISSN 1531-2216
    • (2004) Networks 2004. (ICon 2004). Proceedings. 12th IEEE International Conference on , vol.2 , pp. 470-474
    • Hoang, X.1    Hu, J.2
  • 15
    • 84890861404 scopus 로고    scopus 로고
    • A multi-layer model for anomaly intrusion detection using program sequences of system calls
    • ISSN 1531-2216
    • X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls," in Networks, 2003. ICON2003. The 11th IEEE International Conference on, 2003, pp. 531-536, ISSN 1531-2216
    • (2003) Networks 2003. ICON2003. The 11th IEEE International Conference on , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 29
    • 84883110694 scopus 로고    scopus 로고
    • S. Yu, W. Zhou, W. Jia, and J. Hu, The Computer Journal (2011), URL http://comjnl. oxfordjournals. org/ content/early/2011/07/18/comjnl. bxr065. abstract, http://comjnl. oxfordjournals. org/ content/early/2011/07/18/comjnl. bxr065. full. pdf+html
    • (2011) The Computer Journal
    • Yu, S.1    Zhou, W.2    Jia, W.3    Hu, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.