메뉴 건너뛰기




Volumn 41, Issue 1, 2011, Pages 130-139

An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming

Author keywords

Class association rulemining; Evolutionary computation; Fuzzy membership function; Intrusion detection

Indexed keywords

COMPUTER SOFTWARE REUSABILITY; EVOLUTIONARY ALGORITHMS; GENETIC ALGORITHMS; GENETIC PROGRAMMING; GRAPHIC METHODS; REUSABILITY; TREES (MATHEMATICS);

EID: 84900537680     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2010.2050685     Document Type: Article
Times cited : (174)

References (33)
  • 1
    • 33845947480 scopus 로고    scopus 로고
    • Applying data mining of fuzzy association rules to network intrusion detection
    • presented at the United States Military Academy, West Point, NY
    • J. G.-P. A. El Semaray, J. Edmonds, and M. Papa, "Applying data mining of fuzzy association rules to network intrusion detection," presented at the IEEE Workshop Inf., United States Military Academy, West Point, NY, 2006.
    • (2006) IEEE Workshop Inf
    • El Semaray, J.G.-P.A.1    Edmonds, J.2    Papa, M.3
  • 5
    • 84905049498 scopus 로고    scopus 로고
    • Kddcup
    • Kddcup 1999 data [Online]. Available: kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.
    • (1999) Data
  • 6
    • 69249205008 scopus 로고    scopus 로고
    • Darpa Intrusion Detection datasets [Online]. Available: www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html.
    • Darpa Intrusion Detection Datasets
  • 8
  • 9
    • 41749107387 scopus 로고    scopus 로고
    • Adaboost-based algorithm for network intrusion detection
    • Apr.
    • W. Hu, W. Hu, and S. Maybank, "Adaboost-based algorithm for network intrusion detection," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 38, no. 2, pp. 577-583, Apr. 2008.
    • (2008) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.38 , Issue.2 , pp. 577-583
    • Hu, W.1    Hu, W.2    Maybank, S.3
  • 10
    • 33744529638 scopus 로고    scopus 로고
    • Evolutionary neural networks for anomaly detection based on the behavior of a program
    • Jun.
    • S.-J. Han and S.-B. Cho, "Evolutionary neural networks for anomaly detection based on the behavior of a program," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 3, pp. 559-570, Jun. 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.36 , Issue.3 , pp. 559-570
    • Han, S.-J.1    Cho, S.-B.2
  • 11
    • 49549110728 scopus 로고    scopus 로고
    • Data fusion and cost minimization for intrusion detection
    • Sep.
    • D. Parikh and T. Chen, "Data fusion and cost minimization for intrusion detection," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 381-389, Sep. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.3 , pp. 381-389
    • Parikh, D.1    Chen, T.2
  • 13
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Feb.
    • D. E. Denning, "An intrusion detection model," IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 14
    • 0001882616 scopus 로고
    • Fast algorithms for mining association rules
    • Santiago, Chile
    • R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in Proc. 20th VLDB Conf., Santiago, Chile, 1994, pp. 487-499.
    • (1994) Proc. 20th VLDB Conf , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 20
    • 74949104861 scopus 로고
    • Applying genetic programming to intrusion detection
    • presented at the AAAI Press, Menlo Park, CA, Tech. Rep. FS-95-01
    • M. Crosbie and G. Spafford, "Applying genetic programming to intrusion detection," presented at the AAAI Fall Symp. Series, AAAI Press, Menlo Park, CA, Tech. Rep. FS-95-01, 1995.
    • (1995) AAAI Fall Symp. Series
    • Crosbie, M.1    Spafford, G.2
  • 21
    • 4344588856 scopus 로고    scopus 로고
    • Detecting new forms of network intrusion using genetic programming
    • W. Lu and I. Traore, "Detecting new forms of network intrusion using genetic programming," Comput. Intell., vol. 20, no. 3, pp. 474-494, 2004.
    • (2004) Comput. Intell. , vol.20 , Issue.3 , pp. 474-494
    • Lu, W.1    Traore, I.2
  • 22
    • 35748930908 scopus 로고    scopus 로고
    • A graph-based evolutionary algorithm: Genetic network programming (GNP) and its extension using reinforcement learning
    • S. Mabu, K. Hirasawa, and J. Hu, "A graph-based evolutionary algorithm: Genetic network programming (GNP) and its extension using reinforcement learning," Evol. Comput., vol. 15, no. 3, pp. 369-398, 2007.
    • (2007) Evol. Comput. , vol.15 , Issue.3 , pp. 369-398
    • Mabu, S.1    Hirasawa, K.2    Hu, J.3
  • 23
    • 31744437360 scopus 로고    scopus 로고
    • A study of evolutionary multiagent models based on symbiosis
    • Feb.
    • T. Eguchi, K. Hirasawa, J. Hu, and N. Ota, "A study of evolutionary multiagent models based on symbiosis," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 1, pp. 179-193, Feb. 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.36 , Issue.1 , pp. 179-193
    • Eguchi, T.1    Hirasawa, K.2    Hu, J.3    Ota, N.4
  • 24
    • 46849110563 scopus 로고    scopus 로고
    • A doubledeck elevator group supervisory control system using genetic network programming
    • Jul.
    • K. Hirasawa, T. Eguchi, J. Zhou, L. Yu, and S. Markon, "A doubledeck elevator group supervisory control system using genetic network programming," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 4, pp. 535-550, Jul. 2008.
    • (2008) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev. , vol.38 , Issue.4 , pp. 535-550
    • Hirasawa, K.1    Eguchi, T.2    Zhou, J.3    Yu, L.4    Markon, S.5
  • 25
    • 0034867763 scopus 로고    scopus 로고
    • Comparison between genetic network programming (GNP) and genetic programming (GP)
    • K. Hirasawa, M. Okubo, H. Katagiri, J. Hu, and J. Murata, "Comparison between genetic network programming (GNP) and genetic programming (GP)," in Proc. Congr. Evol. Comput., 2001, pp. 1276-1282.
    • (2001) Proc. Congr. Evol. Comput. , pp. 1276-1282
    • Hirasawa, K.1    Okubo, M.2    Katagiri, H.3    Hu, J.4    Murata, J.5
  • 26
    • 33746470808 scopus 로고    scopus 로고
    • Genetic network programming with acquisition mechanisms of association rules
    • K. Shimada, K. Hirasawa, and J. Hu, "Genetic network programming with acquisition mechanisms of association rules," J. Adv. Comput. Intell. Intell. Inf., vol. 10, no. 1, pp. 102-111, 2006.
    • (2006) J. Adv. Comput. Intell. Intell. Inf. , vol.10 , Issue.1 , pp. 102-111
    • Shimada, K.1    Hirasawa, K.2    Hu, J.3
  • 27
    • 0034832620 scopus 로고    scopus 로고
    • Outliers detection for high dimensional data
    • C. C. Aggarwal and P. Yu, "Outliers detection for high dimensional data," in Proc. ACM SIGMOD Conf., 2001, pp. 37-46.
    • (2001) Proc. ACM SIGMOD Conf. , pp. 37-46
    • Aggarwal, C.C.1    Yu, P.2
  • 28
    • 34548139002 scopus 로고    scopus 로고
    • Class association rule mining with chi-squared test using genetic network programming
    • K. Shimada, K. Hirasawa, and J. Hu, "Class association rule mining with chi-squared test using genetic network programming," in Proc. IEEE Int. Conf. Syst., Man, Cybern., 2006, pp. 5338-5344.
    • (2006) Proc. IEEE Int. Conf. Syst., Man, Cybern. , pp. 5338-5344
    • Shimada, K.1    Hirasawa, K.2    Hu, J.3
  • 29
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 32
    • 50249114634 scopus 로고    scopus 로고
    • Genetic network programming with class association rule acquisition mechanisms from incomplete databases
    • K. Shimada, K. Hirasawa, and J. Hu, "Genetic network programming with class association rule acquisition mechanisms from incomplete databases," in Proc. SICE Annu. Conf., Kagawa, Japan, 2007, pp. 2708-2714.
    • (2007) Proc. SICE Annu. Conf., Kagawa, Japan , pp. 2708-2714
    • Shimada, K.1    Hirasawa, K.2    Hu, J.3
  • 33
    • 72549089077 scopus 로고    scopus 로고
    • Class association rule mining from incomplete database using genetic network programming," (in Japanese)
    • K. Shimada, K. Hirasawa, and J. Hu, "Class association rule mining from incomplete database using genetic network programming," (in Japanese), IEEJ Trans. EIS, vol. 128, no. 5, pp. 795-803, 2008.
    • (2008) IEEJ Trans. EIS , vol.128 , Issue.5 , pp. 795-803
    • Shimada, K.1    Hirasawa, K.2    Hu, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.