메뉴 건너뛰기




Volumn 7, Issue 5, 2013, Pages 67-80

A new fast and high performance intrusion detection system

Author keywords

Computer security; Hierarchical IDS; Hybrid IDS; Intrusion detection system

Indexed keywords

CYBER-ATTACKS; FALSE ALARM RATE; HIERARCHICAL IDS; HIGH DETECTION RATE; HYBRID IDS; INTRUSION DETECTION SYSTEMS; NORMAL BEHAVIOR; RANDOM FORESTS;

EID: 84886458215     PISSN: 17389976     EISSN: None     Source Type: Journal    
DOI: 10.14257/ijsia.2013.7.5.06     Document Type: Article
Times cited : (9)

References (22)
  • 4
    • 0034226287 scopus 로고    scopus 로고
    • A Revised Taxonomy for Intrusion Detection Systems
    • H. Debar, M. Dacier and A. Wespi, "A Revised Taxonomy for Intrusion Detection Systems", Annals of Telecommunications, vol. 55, no. 7-8, (2000), pp. 361-378.
    • (2000) Annals of Telecommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 5
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. Wu. Xiaonan and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review", Applied Soft Computing, vol. 10, no. 1, (2010), pp. 1-35.
    • (2010) Applied Soft Computing , vol.10 , Issue.1 , pp. 1-35
    • Xiaonan, S.W.1    Banzhaf, W.2
  • 7
    • 0442296744 scopus 로고    scopus 로고
    • A Bayesian paradigm for designing intrusion detection systems
    • L. S. Scott, "A Bayesian paradigm for designing intrusion detection systems", Computational Statistics and Data Analysis, vol. 45, no. 1, (2004), pp. 69-83.
    • (2004) Computational Statistics and Data Analysis , vol.45 , Issue.1 , pp. 69-83
    • Scott, L.S.1
  • 8
    • 77954790951 scopus 로고    scopus 로고
    • Using artificial anomalies to detect unknown and known network intrusions
    • W. Fan, M. Miller, S. Stolfo, W. Lee and P. Chan, "Using artificial anomalies to detect unknown and known network intrusions", Knowledge and Information Systems, vol. 6, no. 5, (2004), pp. 507-527.
    • (2004) Knowledge and Information Systems , vol.6 , Issue.5 , pp. 507-527
    • Fan, W.1    Miller, M.2    Stolfo, S.3    Lee, W.4    Chan, P.5
  • 10
    • 21844433474 scopus 로고    scopus 로고
    • Application of online-training SVMs for real-time intrusion detection with different considerations
    • Z. Zhang and H. Shen, "Application of online-training SVMs for real-time intrusion detection with different considerations", Computer Communications, vol. 28, no. 12, (2005), pp. 1428-1442.
    • (2005) Computer Communications , vol.28 , Issue.12 , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2
  • 11
    • 0000231655 scopus 로고    scopus 로고
    • in Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, USA
    • J. Cannady, "Artificial neural networks for misuse detection", in Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, USA, (1998), pp. 368-381.
    • (1998) Artificial neural networks for misuse detection , pp. 368-381
    • Cannady, J.1
  • 12
    • 15944375471 scopus 로고    scopus 로고
    • Intrusion detection using hierarchical neural networks
    • C. Zhang, J. Jiang and M. Kamel, "Intrusion detection using hierarchical neural networks", Pattern Recognition Letters, vol. 26, no. 6, (2005), pp. 779-791.
    • (2005) Pattern Recognition Letters , vol.26 , Issue.6 , pp. 779-791
    • Zhang, C.1    Jiang, J.2    Kamel, M.3
  • 13
    • 33847406678 scopus 로고    scopus 로고
    • A hierarchical intrusion detection model based on the PCA neural network
    • G. Liu, Z. Yi and S. Yang, "A hierarchical intrusion detection model based on the PCA neural network", Neurocomputing, vol. 70, no. 7-9, (2007), pp. 1561-1568.
    • (2007) Neurocomputing , vol.70 , Issue.7-9 , pp. 1561-1568
    • Liu, G.1    Yi, Z.2    Yang, S.3
  • 14
    • 34447639073 scopus 로고    scopus 로고
    • A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
    • A. N. Toosi and M. Kahani, "A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers", Computer Communications, vol. 30, no. 10, (2007), pp. 2201-2212.
    • (2007) Computer Communications , vol.30 , Issue.10 , pp. 2201-2212
    • Toosi, A.N.1    Kahani, M.2
  • 15
    • 69349090629 scopus 로고    scopus 로고
    • A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
    • X. Tong, Z. Wang and H. Yu, "A research using hybrid RBF/Elman neural networks for intrusion detection system secure model", Computer Physics Communications, vol. 180, no. 10, (2009), pp. 1795-1801.
    • (2009) Computer Physics Communications , vol.180 , Issue.10 , pp. 1795-1801
    • Tong, X.1    Wang, Z.2    Yu, H.3
  • 16
    • 84941079784 scopus 로고    scopus 로고
    • A new approach to intrusion detection using artificial neural networks and fuzzy clustering
    • G. Wanga, J. Hao, J. Mab and L. Huanga, "A new approach to intrusion detection using artificial neural networks and fuzzy clustering", Expert Systems with Applications, vol. 37, no. 9, (2010), pp. 6225-6232.
    • (2010) Expert Systems with Applications , vol.37 , Issue.9 , pp. 6225-6232
    • Wanga, G.1    Hao, J.2    Mab, J.3    Huanga, L.4
  • 17
    • 77956613687 scopus 로고    scopus 로고
    • A novel intrusion detection system based on hierarchical clustering and support vector machines
    • S. Horng, M. Su, Y. Chen, T. Kao, R. Chen, J. Lai and C. D, Perkasa, "A novel intrusion detection system based on hierarchical clustering and support vector machines", Expert Systems with Applications, vol. 38, no. 1, (2011), pp. 306-313.
    • (2011) Expert Systems with Applications , vol.38 , Issue.1 , pp. 306-313
    • Horng, S.1    Su, M.2    Chen, Y.3    Kao, T.4    Chen, R.5    Lai, J.6    Perkasa, C.D.7
  • 19
    • 69249230890 scopus 로고    scopus 로고
    • Intrusion detection by machine learning: A review
    • C. Tsaia, Y. Hsub, C. Linc and W. Lin, "Intrusion detection by machine learning: A review", Expert Systems with Applications, vol. 36, no. 10, (2009), pp. 11994-12000.
    • (2009) Expert Systems with Applications , vol.36 , Issue.10 , pp. 11994-12000
    • Tsaia, C.1    Hsub, Y.2    Linc, C.3    Lin, W.4
  • 21
    • 84886522834 scopus 로고    scopus 로고
    • The DARPA Intrusion Detection Data Sets, available at, (accessed June 2012)
    • The DARPA Intrusion Detection Data Sets, available at: http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html (accessed June 2012), (1998).
    • (1998)
  • 22
    • 84886484067 scopus 로고    scopus 로고
    • The KDD CUP 1999 Data, available at, (accessed June 2012)
    • The KDD CUP 1999 Data, available at: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed June 2012), (1999).
    • (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.