메뉴 건너뛰기




Volumn , Issue , 2014, Pages 274-280

Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey

Author keywords

Classification; Data Mining; Intrusion Detection System

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER CRIME; DECISION TREES; FUZZY LOGIC; GENETIC ALGORITHMS; INTELLIGENT SYSTEMS; INTRUSION DETECTION; NEAREST NEIGHBOR SEARCH; SECURITY OF DATA; TREES (MATHEMATICS);

EID: 84949928804     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCO.2014.7103959     Document Type: Conference Paper
Times cited : (22)

References (51)
  • 3
    • 0030157145 scopus 로고    scopus 로고
    • Birch: An efficient data clustering method for very large databases
    • T. Zhang, R. Ramakrishnan, M. Livny, "BIRCH: an efficient data clustering method for very large databases", in: Proceedings of SIGMOD, ACM, 1996, pp. 103-114.
    • (1996) Proceedings of SIGMOD, ACM , pp. 103-114
    • Zhang, T.1    Ramakrishnan, R.2    Livny, M.3
  • 4
    • 36049030250 scopus 로고    scopus 로고
    • A new intrusion detection system using support vector machines and hierarchical clustering
    • L. Khan, M. Awad, B. Thuraisingham, "A new intrusion detection system using support vector machines and hierarchical clustering", The VLDB Journal 16(2007) 507-521.
    • (2007) The VLDB Journal , vol.16 , pp. 507-521
    • Khan, L.1    Awad, M.2    Thuraisingham, B.3
  • 5
    • 84901589215 scopus 로고    scopus 로고
    • Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction
    • X. Xu, "Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction", Information Assurance and Security 4 (2006) 237-246.
    • (2006) Information Assurance and Security , vol.4 , pp. 237-246
    • Xu, X.1
  • 6
    • 84886382572 scopus 로고    scopus 로고
    • High performance query expansion using adaptive co-training
    • J. X. Huang, J. Miao, Ben He, "High performance query expansion using adaptive co-training", Information Processing & Management 49 (2) (2013) 441-453.
    • (2013) Information Processing & Management , vol.49 , Issue.2 , pp. 441-453
    • Huang, J.X.1    Miao, J.2    He, B.3
  • 7
    • 79957591079 scopus 로고    scopus 로고
    • An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets
    • Y. Li u, X. Yu, J. X. Huang, A. " An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets", Information Processing &Management 47 (4) (2011) 617-631.
    • (2011) Information Processing &management , vol.47 , Issue.4 , pp. 617-631
    • Liu, Y.1    Yu, X.2    Huang, A.J.X.3
  • 11
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. X. Wu, W. Banzhaf, "The use of computational intelligence in intrusion detection systems: a review", Applied Soft Computing 10 (2010) 1-35.
    • (2010) Applied Soft Computing , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 12
  • 19
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T. F. Lunt, "A survey of intrusion detection techniques", Computers and Security12 (4) (1993) 405-418.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 24
    • 0033667059 scopus 로고    scopus 로고
    • Comparing local search with respect to genetic evolution to detect intrusion in computer networks
    • La Jolla, CA,IEEE Press, 16-19 July
    • Neri, F., "Comparing local search with respect to genetic evolution to detect intrusion in computer networks", In Proc. of the 2000 Congress on Evolutionary Computation CEC00, La Jolla, CA, pp. 238243. IEEE Press, 16-19 July, 2000.
    • (2000) Proc. of the 2000 Congress on Evolutionary Computation CEC00 , pp. 238243
    • Neri, F.1
  • 29
    • 1642330574 scopus 로고    scopus 로고
    • Fuzzy arithmetic with requisite constraints
    • G. J. Klir,"Fuzzy arithmetic with requisite constraints", Fuzzy Sets and Systems, 91:165175, 1997. http://wenke. gtisc. gatech. edu/project/image004. gif
    • (1997) Fuzzy Sets and Systems , vol.91 , pp. 165175
    • Klir, G.J.1
  • 36
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T. F. Lunt, "A survey of intrusion detection techniques", Computers and Security12 (4) (1993) 405-418.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 41
    • 0033667059 scopus 로고    scopus 로고
    • Comparing local search with respect to genetic evolution to detect intrusion in computer networks
    • La Jolla, CA,IEEE Press, 16-19 July
    • Neri, F., "Comparing local search with respect to genetic evolution to detect intrusion in computer networks", In Proc. of the 2000 Congress on Evolutionary Computation CEC00, La Jolla, CA, pp. 238243. IEEE Press, 16-19 July, 2000.
    • (2000) Proc. of the 2000 Congress on Evolutionary Computation CEC00 , pp. 238243
    • Neri, F.1
  • 45
    • 84934277641 scopus 로고
    • Active defense of a computer system agents
    • Purdue Univ. West Lafayette, IN, 15 February
    • Crosbie, M. and E. H. Spafford,"Active defense of a computer system agents", Technical Report CSDTR-95-008, Purdue Univ. West Lafayette, IN, 15 February 1995.
    • (1995) Technical Report CSDTR-95-008
    • Crosbie, M.1    Spafford, E.H.2
  • 46
    • 1642330574 scopus 로고    scopus 로고
    • Fuzzy arithmetic with requisite constraints
    • G. J. Klir,"Fuzzy arithmetic with requisite constraints", Fuzzy Sets and Systems, 91:165175, 1997 http://wenke. gtisc. gatech. edu/project/image004. gif
    • (1997) Fuzzy Sets and Systems , vol.91 , pp. 165175
    • Klir, G.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.