메뉴 건너뛰기




Volumn 37, Issue 9, 2010, Pages 6225-6232

A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

Author keywords

Artificial Neural Networks; Fuzzy clustering; Intrusion detection systems

Indexed keywords

COMPUTER CRIME; DECISION TREES; FUZZY CLUSTERING; FUZZY INFERENCE; FUZZY LOGIC; FUZZY NEURAL NETWORKS; NEURAL NETWORKS;

EID: 84941079784     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2010.02.102     Document Type: Article
Times cited : (409)

References (33)
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S. (2003). The base-rate fallacy and the difficulty of intrusion detection. ACM Transaction on Information and System Security, 3, 186-205.
    • (2003) ACM Transaction on Information and System Security , vol.3 , pp. 186-205
    • Anderson, J.1
  • 5
    • 53049099150 scopus 로고    scopus 로고
    • Critical study of neural networks in detecting intrusions
    • Beghdad, R. (2008). Critical study of neural networks in detecting intrusions. Computers and Security, 27(5-6), 168-175.
    • (2008) Computers and Security , vol.27 , Issue.5-6 , pp. 168-175
    • Beghdad, R.1
  • 7
    • 33947581868 scopus 로고    scopus 로고
    • Hybrid flexible neural-tree-based intrusion detection systems
    • DOI 10.1002/int.20203
    • Chen, Y. H., Abraham, A., & Yang, B. (2007). Hybrid flexible neural-tree-based intrusion detection systems. International Journal of Intelligent Systems, 22(4), 337-352. (Pubitemid 46480226)
    • (2007) International Journal of Intelligent Systems , vol.22 , Issue.4 , pp. 337-352
    • Chen, Y.1    Abraham, A.2    Yang, B.3
  • 8
    • 84974743850 scopus 로고
    • Fuzzy model identification based on cluster estimation
    • Chiu, S. L. (1994). Fuzzy model identification based on cluster estimation. Journal of Intelligent and Fuzzy Systems, 2, 267-278.
    • (1994) Journal of Intelligent and Fuzzy Systems , vol.2 , pp. 267-278
    • Chiu, S.L.1
  • 9
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
    • Depren, O., Topallar, M., Anarim, E., & Ciliz, M. K. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications, 29(4), 713-722. (Pubitemid 41394445)
    • (2005) Expert Systems with Applications , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 13
    • 33744529638 scopus 로고    scopus 로고
    • Evolutionary neural networks for anomaly detection based on the behavior of a program
    • Han, S. J., & Cho, S. B. (2005). Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man and Cybernetics (Part B), 36(3), 559-570.
    • (2005) IEEE Transactions on Systems, Man and Cybernetics (Part B) , vol.36 , Issue.3 , pp. 559-570
    • Han, S.J.1    Cho, S.B.2
  • 17
    • 0037411435 scopus 로고    scopus 로고
    • The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
    • Joo, D., Hong, T., & Han, I. (2003). The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors. Expert Systems with Applications, 25(1), 69-75.
    • (2003) Expert Systems with Applications , vol.25 , Issue.1 , pp. 69-75
    • Joo, D.1    Hong, T.2    Han, I.3
  • 18
    • 50249160574 scopus 로고    scopus 로고
    • (accessed March 2009)
    • KDD CUP 1999 dataset (1999). http://archive.ics.uci.edu/ml/datasets/ KDD+Cup+1999+Data (accessed March 2009).
    • (1999) KDD CUP 1999 Dataset
  • 20
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset
    • Lindqvist, U., & Porras, P. A. (1999). Detecting computer and network misuse through the production-based expert system toolset. In: IEEE symposium on security and privacy (pp. 146-161).
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 21
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • DOI 10.1109/MCOM.2002.1039860
    • Manikopoulos, C., & Papavassiliou, S. (2002). Network intrusion and fault detection: A statistical anomaly approach. IEEE Communications Magazine, 40(10), 76-82. (Pubitemid 35311949)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 24
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
    • Patcha, A., & Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448-3470. (Pubitemid 46921030)
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 25
    • 84888927134 scopus 로고    scopus 로고
    • Frequent rules for intrusive anomaly detection with Internet data mining
    • Qin, M., & Hwang, K. (2004). Frequent rules for intrusive anomaly detection with Internet data mining. In: Proceedings of the 13th USENIX security symposium (pp. 456-462).
    • (2004) Proceedings of the 13th USENIX security symposium , pp. 456-462
    • Qin, M.1    Hwang, K.2
  • 29
    • 0029531733 scopus 로고
    • The application of neural networks to UNIX computer security. In: Proceedings of the
    • Tan, K. (1995). The application of neural networks to UNIX computer security. In: Proceedings of the IEEE international conference on neural networks (Vol. 7, pp. 476-481).
    • (1995) IEEE international conference on neural networks , vol.7 , pp. 476-481
    • Tan, K.1
  • 32
    • 58349096877 scopus 로고    scopus 로고
    • Data mining-based intrusion detectors
    • Wu, S., & Yen, E. (2009). Data mining-based intrusion detectors. Expert Systems with Applications, 36(3), 5605-5612.
    • (2009) Expert Systems with Applications , vol.36 , Issue.3 , pp. 5605-5612
    • Wu, S.1    Yen, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.