-
1
-
-
0034300682
-
Intrusion detection using autonomous agents
-
E.H. Spafford, and D. Zamboni Intrusion detection using autonomous agents Comput. Netw. 34 4 2000 547 570
-
(2000)
Comput. Netw.
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
2
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S.X. Wu, and W. Banzhaf The use of computational intelligence in intrusion detection systems: a review Appl. Soft Comput. 10 1 2010 1 35
-
(2010)
Appl. Soft Comput.
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
3
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques systems and challenges
-
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-Fernández, and E. Vázquez Anomaly-based network intrusion detection: techniques systems and challenges Comput. Secur. 28 1 2009 18 28
-
(2009)
Comput. Secur.
, vol.28
, Issue.1
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Maciá-Fernández, G.3
Vázquez, E.4
-
4
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin Intrusion detection by machine learning: a review Expert Syst. Appl. 36 10 2009 11994 12000
-
(2009)
Expert Syst. Appl.
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.-F.1
Hsu, Y.-F.2
Lin, C.-Y.3
Lin, W.-Y.4
-
5
-
-
78650169163
-
The use of artificial intelligence based techniques for intrusion detection: A review
-
G. Kumar, K. Kumar, and M. Sachdeva The use of artificial intelligence based techniques for intrusion detection: a review Artif. Intell. Rev. 34 4 2010 369 387
-
(2010)
Artif. Intell. Rev.
, vol.34
, Issue.4
, pp. 369-387
-
-
Kumar, G.1
Kumar, K.2
Sachdeva, M.3
-
6
-
-
27144442442
-
Discovering interesting patterns for investment decision making with GLOWER: A genetic learner overlaid with entropy reduction
-
V. Dhar, D. Chou, and F. Provost Discovering interesting patterns for investment decision making with GLOWER: a genetic learner overlaid with entropy reduction Data Min. Knowl. Discov. 4 4 2000 251 280
-
(2000)
Data Min. Knowl. Discov.
, vol.4
, Issue.4
, pp. 251-280
-
-
Dhar, V.1
Chou, D.2
Provost, F.3
-
7
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred Statistical approaches to DDoS attack detection and response DARPA Information Survivability Conference and Exposition, 2003. IEEE Proceedings, vol. 1 2003 303 314
-
(2003)
DARPA Information Survivability Conference and Exposition, 2003. IEEE Proceedings, Vol. 1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
8
-
-
35248852487
-
Evolving multiple discretizations with adaptive intervals for a Pittsburgh rule-based learning classifier system
-
Springer
-
J. Bacardit, and J.M. Garrell Evolving multiple discretizations with adaptive intervals for a Pittsburgh rule-based learning classifier system Genetic and Evolutionary Computation-GECCO 2003 2003 Springer 1818 1831
-
(2003)
Genetic and Evolutionary Computation-GECCO 2003
, pp. 1818-1831
-
-
Bacardit, J.1
Garrell, J.M.2
-
9
-
-
70349632412
-
Performance and efficiency of memetic Pittsburgh learning classifier systems
-
J. Bacardit, and N. Krasnogor Performance and efficiency of memetic Pittsburgh learning classifier systems Evol. comput. 17 3 2009 307 342
-
(2009)
Evol. Comput.
, vol.17
, Issue.3
, pp. 307-342
-
-
Bacardit, J.1
Krasnogor, N.2
-
11
-
-
84929640982
-
-
KDD99
-
KDD99, http://kdd.ccs.uci.edu/databases/kddcup99/task.html.
-
-
-
-
14
-
-
84929640983
-
-
CAIDA
-
CAIDA, http://www.caida.org/data/passive/ddos-20070804-dataset.xml.
-
-
-
-
15
-
-
80455144626
-
Parametric differences between a real-world distributed denial-of-service attack and a flash event
-
S. Bhatia, G. Mohay, A. Tickle, and E. Ahmed Parametric differences between a real-world distributed denial-of-service attack and a flash event 2011 Sixth International Conference on Availability, Reliability and Security (ARES), IEEE 2011 210 217
-
(2011)
2011 Sixth International Conference on Availability, Reliability and Security (ARES), IEEE
, pp. 210-217
-
-
Bhatia, S.1
Mohay, G.2
Tickle, A.3
Ahmed, E.4
-
16
-
-
79957530146
-
Low-rate DDoS attacks detection and traceback by using new information metrics
-
Y. Xiang, K. Li, and W. Zhou Low-rate DDoS attacks detection and traceback by using new information metrics IEEE Trans. Inform. Forensics Secur. 6 2 2011 426 437
-
(2011)
IEEE Trans. Inform. Forensics Secur.
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
20
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, and S.J. Stolfo A framework for constructing features and models for intrusion detection systems ACM Trans. Inform. Syst. Secur. 3 4 2000 227 261
-
(2000)
ACM Trans. Inform. Syst. Secur.
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
21
-
-
84885780432
-
Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection
-
K. Shafi, and H.A. Abbass Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection Pattern Anal. Appl. 16 4 2013 549 566
-
(2013)
Pattern Anal. Appl.
, vol.16
, Issue.4
, pp. 549-566
-
-
Shafi, K.1
Abbass, H.A.2
-
23
-
-
0033671768
-
Discovering comprehensible classification rules with a genetic algorithm
-
M.V. Fidelis, H. Lopes, and A. Freitas Discovering comprehensible classification rules with a genetic algorithm Proceedings of the 2000 Congress on Evolutionary Computation, vol. 1, IEEE 2000 805 810
-
(2000)
Proceedings of the 2000 Congress on Evolutionary Computation, Vol. 1, IEEE
, pp. 805-810
-
-
Fidelis, M.V.1
Lopes, H.2
Freitas, A.3
-
26
-
-
33646851992
-
A software implementation of a genetic algorithm based approach to network intrusion detection
-
R.H. Gong, M. Zulkernine, and P. Abolmaesumi A software implementation of a genetic algorithm based approach to network intrusion detection 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks on Software Engineering, Sixth International Conference on Artificial Intelligence, Networking and Parallel/Distributed Computing, IEEE, SNPD/SAWN 2005 2005 246 253
-
(2005)
2005 and First ACIS International Workshop on Self-Assembling Wireless Networks on Software Engineering, Sixth International Conference on Artificial Intelligence, Networking and Parallel/Distributed Computing, IEEE, SNPD/SAWN 2005
, pp. 246-253
-
-
Gong, R.H.1
Zulkernine, M.2
Abolmaesumi, P.3
-
27
-
-
84929640984
-
-
MIT Lincoln Laboratory DARPA Dataset 2015 http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/index.html
-
(2015)
DARPA Dataset
-
-
Lincoln Laboratory, M.1
-
28
-
-
4344588856
-
Detecting new forms of network intrusion using genetic programming
-
W. Lu, and I. Traore Detecting new forms of network intrusion using genetic programming Comput. Intell. 20 3 2004 475 494
-
(2004)
Comput. Intell.
, vol.20
, Issue.3
, pp. 475-494
-
-
Lu, W.1
Traore, I.2
-
29
-
-
0347411204
-
Combining boosting and evolutionary algorithms for learning of fuzzy classification rules
-
F. Hoffmann Combining boosting and evolutionary algorithms for learning of fuzzy classification rules Fuzzy Sets Syst. 141 1 2004 47 58
-
(2004)
Fuzzy Sets Syst.
, vol.141
, Issue.1
, pp. 47-58
-
-
Hoffmann, F.1
-
30
-
-
0008091191
-
What is a learning classifier system?
-
Springer
-
J.H. Holland, L.B. Booker, M. Colombetti, M. Dorigo, D.E. Goldberg, S. Forrest, R.L. Riolo, R.E. Smith, P.L. Lanzi, and W. Stolzmann What is a learning classifier system? Learning Classifier Systems 2000 Springer 3 32
-
(2000)
Learning Classifier Systems
, pp. 3-32
-
-
Holland, J.H.1
Booker, L.B.2
Colombetti, M.3
Dorigo, M.4
Goldberg, D.E.5
Forrest, S.6
Riolo, R.L.7
Smith, R.E.8
Lanzi, P.L.9
Stolzmann, W.10
-
31
-
-
69249216488
-
An adaptive genetic-based signature learning system for intrusion detection
-
K. Shafi, and H.A. Abbass An adaptive genetic-based signature learning system for intrusion detection Expert Syst. Appl. 36 10 2009 12036 12043
-
(2009)
Expert Syst. Appl.
, vol.36
, Issue.10
, pp. 12036-12043
-
-
Shafi, K.1
Abbass, H.A.2
-
32
-
-
38049120100
-
Bloat control and generalization pressure using the minimum description length principle for a Pittsburgh approach learning classifier system
-
Springer
-
J. Bacardit, and J.M. Garrell Bloat control and generalization pressure using the minimum description length principle for a Pittsburgh approach learning classifier system Learning Classifier Systems 2007 Springer 59 79
-
(2007)
Learning Classifier Systems
, pp. 59-79
-
-
Bacardit, J.1
Garrell, J.M.2
-
34
-
-
0042643357
-
Get real! XCS with continuous-valued inputs
-
Springer
-
S.W. Wilson Get real! XCS with continuous-valued inputs Learning Classifier Systems 2000 Springer 209 219
-
(2000)
Learning Classifier Systems
, pp. 209-219
-
-
Wilson, S.W.1
-
35
-
-
33644537355
-
Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race
-
ACM
-
H. Hou, and G. Dozier Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race Proceedings of the 2005 ACM Symposium on Applied Computing 2005 ACM 952 956
-
(2005)
Proceedings of the 2005 ACM Symposium on Applied Computing
, pp. 952-956
-
-
Hou, H.1
Dozier, G.2
-
38
-
-
0001972236
-
Addressing the curse of imbalanced training sets: One-sided selection, vol. 97
-
Nashville, USA
-
M. Kubat, and S. Matwin Addressing the curse of imbalanced training sets: one-sided selection, vol. 97 ICML Nashville, USA 1997 179 186
-
(1997)
ICML
, pp. 179-186
-
-
Kubat, M.1
Matwin, S.2
-
39
-
-
70349617264
-
Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy
-
S. Garcí a, and F. Herrera Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy Evol. Comput. 17 3 2009 275 306
-
(2009)
Evol. Comput.
, vol.17
, Issue.3
, pp. 275-306
-
-
Garcí, A.S.1
Herrera, F.2
-
40
-
-
0036522693
-
Strategies for learning in class imbalance problems
-
R. Barandela, J.S. Sánchez, V. GarcIa, and E. Rangel Strategies for learning in class imbalance problems Pattern Recogn. 36 3 2003 849 851
-
(2003)
Pattern Recogn.
, vol.36
, Issue.3
, pp. 849-851
-
-
Barandela, R.1
Sánchez, J.S.2
Garcia, V.3
Rangel, E.4
-
41
-
-
0003957032
-
-
I.H. Witten, E. Frank, L.E. Trigg, M.A. Hall, G. Holmes, and S.J. Cunningham Weka: Practical Machine Learning Tools and Techniques with Java Implementations 1999
-
(1999)
Weka: Practical Machine Learning Tools and Techniques with Java Implementations
-
-
Witten, I.H.1
Frank, E.2
Trigg, L.E.3
Hall, M.A.4
Holmes, G.5
Cunningham, S.J.6
-
42
-
-
55549103698
-
KEEL: A software tool to assess evolutionary algorithms for data mining problems
-
J. Alcala-Fdez, L. Sanchez, S. Garcia, M.J. del Jesus, S. Ventura, J. Garrell, J. Otero, C. Romero, J. Bacardit, and V.M. Rivas KEEL: a software tool to assess evolutionary algorithms for data mining problems Soft Comput. 13 3 2009 307 318
-
(2009)
Soft Comput.
, vol.13
, Issue.3
, pp. 307-318
-
-
Alcala-Fdez, J.1
Sanchez, L.2
Garcia, S.3
Del Jesus, M.J.4
Ventura, S.5
Garrell, J.6
Otero, J.7
Romero, C.8
Bacardit, J.9
Rivas, V.M.10
-
43
-
-
84874149164
-
Intrusion detection using naive Bayes classifier with feature reduction
-
S. Mukherjee, and N. Sharma Intrusion detection using naive Bayes classifier with feature reduction Proc. Technol. 4 2012 119 128
-
(2012)
Proc. Technol.
, vol.4
, pp. 119-128
-
-
Mukherjee, S.1
Sharma, N.2
-
46
-
-
78650509104
-
An advanced entropy-based DDOS detection scheme
-
Vol. 2, IEEE
-
J. Zhang, Z. Qin, L. Ou, P. Jiang, J. Liu, and A. Liu An advanced entropy-based DDOS detection scheme 2010 International Conference on Information Networking and Automation (ICINA) Vol. 2, IEEE 2010 V2 67
-
(2010)
2010 International Conference on Information Networking and Automation (ICINA)
, pp. V2-67
-
-
Zhang, J.1
Qin, Z.2
Ou, L.3
Jiang, P.4
Liu, J.5
Liu, A.6
-
48
-
-
83355167101
-
An entropy and volume-based approach for identifying malicious activities in honeynet traffic
-
M.H. Sqalli, S.N. Firdous, Z. Baig, and F. Azzedin An entropy and volume-based approach for identifying malicious activities in honeynet traffic 2011 International Conference on Cyberworlds (CW), IEEE 2011 23 30
-
(2011)
2011 International Conference on Cyberworlds (CW), IEEE
, pp. 23-30
-
-
Sqalli, M.H.1
Firdous, S.N.2
Baig, Z.3
Azzedin, F.4
|