메뉴 건너뛰기




Volumn 16, Issue 4, 2013, Pages 549-566

Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection

Author keywords

Genetic based learning; Incremental learning; Intrusion detection; Intrusion detection evaluation; Online learning; Signature extraction; Supervised learning

Indexed keywords


EID: 84885780432     PISSN: 14337541     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10044-011-0255-5     Document Type: Article
Times cited : (31)

References (41)
  • 2
  • 3
    • 84885810499 scopus 로고    scopus 로고
    • Testing Firewalls and IDS with FTester
    • Barisani A (2003) Testing firewalls and IDS with FTester. TISC Insight Newslett 5(6): 2-4.
    • (2003) TISC Insight Newslett , vol.5 , Issue.6 , pp. 2-4
    • Barisani, A.1
  • 4
    • 0043284115 scopus 로고    scopus 로고
    • Accuracy-Based Learning Classifier Systems: Models, Analysis and Applications to Classification Tasks
    • Bernadó-Mansilla E, Garrell JM (2003) Accuracy-based learning classifier systems: models, analysis and applications to classification tasks. Evol Comput 11(3): 209-238.
    • (2003) Evol Comput , vol.11 , Issue.3 , pp. 209-238
    • Ester, B.M.1    Josep, M.G.2
  • 6
    • 34548025132 scopus 로고    scopus 로고
    • A survey of kernel and spectral methods for clustering
    • Filippone M, Camastra F, Masulli F, Rovetta S (2008) A survey of kernel and spectral methods for clustering. Pattern Recogn 41(1): 176-190.
    • (2008) Pattern Recogn , vol.41 , Issue.1 , pp. 176-190
    • Filippone, M.1    Camastra, F.2    Masulli, F.3    Rovetta, S.4
  • 12
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
    • Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Trans Dependable Secure Comput 4(1): 41-55.
    • (2007) IEEE Trans Dependable Secure Comput , vol.4 , Issue.1 , pp. 41-55
    • Hwang, K.1    Cai, M.2    Chen, Y.3    Qin, M.4
  • 13
    • 34147111253 scopus 로고    scopus 로고
    • Network intrusion detection in covariance feature space
    • Jin S, Yeung DS, Wang X (2007) Network intrusion detection in covariance feature space. Pattern Recogn 40(8): 2185-2197.
    • (2007) Pattern Recogn , vol.40 , Issue.8 , pp. 2185-2197
    • Jin, S.1    Yeung, D.S.2    Wang, X.3
  • 17
    • 1842712339 scopus 로고    scopus 로고
    • A genetic clustering method for intrusion detection
    • Liu Y, Chen K, Liao X, Zhang W (2004) A genetic clustering method for intrusion detection. Pattern Recogn 37(5): 927-942.
    • (2004) Pattern Recogn , vol.37 , Issue.5 , pp. 927-942
    • Liu, Y.1    Chen, K.2    Liao, X.3    Zhang, W.4
  • 18
    • 2442421953 scopus 로고    scopus 로고
    • Generating realistic network traffic for security experiments
    • Luo S, Marin GA (2004) Generating realistic network traffic for security experiments. In: Proceedings of the IEEE SoutheastCon, pp 200-207.
    • (2004) Proceedings of the IEEE SoutheastCon , pp. 200-207
    • Luo, S.1    Marin, G.A.2
  • 21
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
    • Springer, Berlin
    • Mahoney MV, Chan PK (2003) An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Proceedings of recent advances in intrusion detection (RAID) 2003. Springer, Berlin, pp 220-237.
    • (2003) Proceedings of recent advances in intrusion detection (RAID) 2003 , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 23
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst Secur 3(4): 262-294.
    • (2000) ACM Trans Inf Syst Secur , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 25
    • 84885783446 scopus 로고    scopus 로고
    • PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)
    • Chicago, IL, USA, 5-7 April, 2001
    • Ramesh A, Mahesh JV (2001) PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection). In: Proceedings of the first SIAM international conference on data mining, Chicago, IL, USA, 5-7 April, 2001.
    • (2001) Proceedings of the first SIAM international conference on data mining
    • Ramesh, A.1    Mahesh, J.V.2
  • 26
    • 85090433665 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection for networks
    • Roesch M (1999) Snort-lightweight intrusion detection for networks. In: Proceedings of USENIX LISA, pp 229-238. http://www. snort. org/.
    • (1999) Proceedings of USENIX LISA , pp. 229-238
    • Roesch, M.1
  • 28
    • 49649112245 scopus 로고    scopus 로고
    • Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
    • Sabhnani M, Serpen G (2004) Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set. Intell Data Anal 8(4): 403-415.
    • (2004) Intell Data Anal , vol.8 , Issue.4 , pp. 403-415
    • Sabhnani, M.1    Serpen, G.2
  • 30
    • 69249216488 scopus 로고    scopus 로고
    • An adaptive genetic-based signature learning system for intrusion detection
    • Shafi K, Abbass HA (2009) An adaptive genetic-based signature learning system for intrusion detection. Expert Syst Appl 36(10): 12036-12043.
    • (2009) Expert Syst Appl , vol.36 , Issue.10 , pp. 12036-12043
    • Shafi, K.1    Abbass, H.A.2
  • 31
  • 34
  • 38
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. Proc Recent Adv Intrusion Detect 7: 201-222.
    • (2004) Proc Recent Adv Intrusion Detect , vol.7 , pp. 201-222
    • Wang, K.1    Stolfo, S.J.2
  • 39
    • 0001387704 scopus 로고
    • Classifier fitness based on accuracy
    • Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2): 149-175.
    • (1995) Evol Comput , vol.3 , Issue.2 , pp. 149-175
    • Wilson, S.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.