메뉴 건너뛰기




Volumn 66, Issue , 2016, Pages 1-16

Ensemble based collaborative and distributed intrusion detection systems: A survey

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER CRIME; DATA MINING; MERCURY (METAL); REAL TIME SYSTEMS;

EID: 84962205019     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.03.011     Document Type: Review
Times cited : (116)

References (109)
  • 1
    • 84945936408 scopus 로고    scopus 로고
    • A novel SVM-kNN-PSO ensemble method for intrusion detection system
    • Abdulla Amin Aburomman, and Mamun Bin Ibne Reaz A novel SVM-kNN-PSO ensemble method for intrusion detection system Appl. Soft Comput. 38 2016 360 372
    • (2016) Appl. Soft Comput. , vol.38 , pp. 360-372
    • Aburomman, A.A.1    Ibne Reaz, M.B.2
  • 4
    • 79956097533 scopus 로고    scopus 로고
    • Mutual information-based feature selection for intrusion detection systems
    • Fatemeh Amiri, Mohammad Mahdi Rezaei Yousefi, Caro Lucas, Azadeh Shakery, and Nasser Yazdani Mutual information-based feature selection for intrusion detection systems J. Netw. Comput. Appl. 34 4 2011 1184 1199
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.4 , pp. 1184-1199
    • Amiri, F.1    Yousefi, M.M.R.2    Lucas, C.3    Shakery, A.4    Yazdani, N.5
  • 5
    • 83455234551 scopus 로고    scopus 로고
    • HMMP ayl: An application of HMM to the analysis of the HTTP payload
    • Tom Diethe, Nello Cristianini, John Shawe-Taylor (Eds.) WAPA 2010, September 1-3, Cumberland Lodge, Windsor, UK
    • Ariu, Davide, Giacinto, Giorgio, 2010. HMMP ayl: an application of HMM to the analysis of the HTTP payload. In: Tom Diethe, Nello Cristianini, John Shawe-Taylor (Eds.), Proceedings of the First Workshop on Applications of Pattern Analysis, WAPA 2010, September 1-3, vol. 11. Cumberland Lodge, Windsor, UK, pp. 81-87.
    • (2010) Proceedings of the First Workshop on Applications of Pattern Analysis , vol.11 , pp. 81-87
    • Ariu, D.1    Giacinto, G.2
  • 6
    • 79955482186 scopus 로고    scopus 로고
    • HMMPayl: An intrusion detection system based on Hidden Markov Models
    • Davide Ariu, Roberto Tronci, and Giorgio Giacinto HMMPayl: an intrusion detection system based on Hidden Markov Models Comput. Secur. 30 4 2011 221 241
    • (2011) Comput. Secur. , vol.30 , Issue.4 , pp. 221-241
    • Ariu, D.1    Tronci, R.2    Giacinto, G.3
  • 12
    • 80053510589 scopus 로고    scopus 로고
    • Surveying Port Scans and their detection methodologies
    • Monowar H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita Surveying Port Scans and their detection methodologies Comput. J. 54 October (10) 2011 1565 1581
    • (2011) Comput. J. , vol.54 , Issue.10 OCTOBER , pp. 1565-1581
    • Bhuyan, M.H.1    Bhattacharyya, D.K.2    Kalita, J.K.3
  • 14
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Burton H. Bloom Space/time trade-offs in hash coding with allowable errors Commun. ACM 13 7 1970 422 426
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 15
    • 84857332705 scopus 로고    scopus 로고
    • Cross-domain collaborative anomaly detection: so far yet so close
    • Sommer, Robin, Balzarotti, Davide, Maier, Gregor (Eds.) Springer, Berlin, Heidelberg
    • Boggs, Nathaniel, Hiremagalore, Sharath, Stavrou, Angelos, Stolfo, J. Salvatore, 2011. Cross-domain collaborative anomaly detection: so far yet so close. In: Sommer, Robin, Balzarotti, Davide, Maier, Gregor (Eds.), Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 6961. Springer, Berlin, Heidelberg, pp. 142-160.
    • (2011) Recent Advances in Intrusion Detection, Lecture Notes in Computer Science , vol.6961 , pp. 142-160
    • Boggs, N.1    Hiremagalore, S.2    Stavrou, A.3    Salvatore, S.J.4
  • 19
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • Leo Breiman Random forests Mach. Learn. 45 1 2001 5 32
    • (2001) Mach. Learn. , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 20
    • 79959436534 scopus 로고    scopus 로고
    • Comprehensive evolutionary approach for neural network ensemble automatic design
    • Barcelona, Spain, July
    • Bukhtoyarov, V.V., Semenkina, O.E., 2010. Comprehensive evolutionary approach for neural network ensemble automatic design. In: 2010 IEEE Congress on Evolutionary Computation (CEC), Barcelona, Spain, July, pp. 1-6.
    • (2010) 2010 IEEE Congress on Evolutionary Computation (CEC) , pp. 1-6
    • Bukhtoyarov, V.V.1    Semenkina, O.E.2
  • 21
    • 84906351954 scopus 로고    scopus 로고
    • Ensemble-distributed approach in classification problem solution for intrusion detection systems
    • Corchado, Emilio, Lozano, José A., Quintián, Héctor, Yin, Hujun (Eds.) Springer International Publishing, Salamanca, Spain
    • Bukhtoyarov, Vladimir, Zhukov, Vadim, 2014. Ensemble-distributed approach in classification problem solution for intrusion detection systems. In: Corchado, Emilio, Lozano, José A., Quintián, Héctor, Yin, Hujun (Eds.), Intelligent Data Engineering and Automated Learning, IDEAL 2014, Lecture Notes in Computer Science, vol. 8669. Springer International Publishing, Salamanca, Spain, pp. 255-265.
    • (2014) Intelligent Data Engineering and Automated Learning, IDEAL 2014, Lecture Notes in Computer Science , vol.8669 , pp. 255-265
    • Bukhtoyarov, V.1    Zhukov, V.2
  • 23
    • 84858698273 scopus 로고    scopus 로고
    • Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
    • Pedro Casas, Johan Mazel, and Philippe Owezarski Unsupervised network intrusion detection systems: detecting the unknown without knowledge Comput. Commun. 35 7 2012 772 783
    • (2012) Comput. Commun. , vol.35 , Issue.7 , pp. 772-783
    • Casas, P.1    Mazel, J.2    Owezarski, P.3
  • 25
    • 67349154442 scopus 로고    scopus 로고
    • Information fusion for computer security: State of the art and open issues
    • Special Issue on Information Fusion in Computer Security
    • Corona, Igino, Giacinto, Giorgio, Mazzariello, Claudio, Roli, Fabio, Sansone, Carlo, 2009. Information fusion for computer security: state of the art and open issues. Inf. Fusion, 10(4), 274-284, Special Issue on Information Fusion in Computer Security.
    • (2009) Inf. Fusion , vol.10 , Issue.4 , pp. 274-284
    • Corona, I.1    Giacinto, G.2    Mazzariello, C.3    Roli, F.4    Sansone, C.5
  • 28
  • 29
    • 0028911698 scopus 로고
    • Gauging similarity with n-grams: Language-independent categorization of text
    • Marc Damashek Gauging similarity with n-grams: language-independent categorization of text Science 267 5199 1995 843 848
    • (1995) Science , vol.267 , Issue.5199 , pp. 843-848
    • Damashek, M.1
  • 30
    • 0242302742 scopus 로고    scopus 로고
    • Intrusion detection
    • Belur V. Dasarathy Intrusion detection Inf. Fusion 4 4 2003 243 245
    • (2003) Inf. Fusion , vol.4 , Issue.4 , pp. 243-245
    • Dasarathy, B.V.1
  • 32
    • 80051793908 scopus 로고    scopus 로고
    • Data preprocessing for anomaly based network intrusion detection: A review
    • Jonathan J. Davis, and Andrew J. Clark Data preprocessing for anomaly based network intrusion detection: a review Comput. Secur. 30 6-7 2011 353 375
    • (2011) Comput. Secur. , vol.30 , Issue.6-7 , pp. 353-375
    • Davis, J.J.1    Clark, A.J.2
  • 33
    • 2942723846 scopus 로고    scopus 로고
    • A divisive information theoretic feature clustering algorithm for text classification
    • Inderjit S. Dhillon, Subramanyam Mallela, and Rahul Kumar A divisive information theoretic feature clustering algorithm for text classification J. Mach. Learn. Res. 3 March 2003 1265 1287
    • (2003) J. Mach. Learn. Res. , vol.3 , Issue.MARCH , pp. 1265-1287
    • Dhillon, I.S.1    Mallela, S.2    Kumar, R.3
  • 36
    • 84941155240 scopus 로고
    • Well-separated clusters and optimal fuzzy partitions
    • J.C. Dunn Well-separated clusters and optimal fuzzy partitions J. Cybern. 4 1 1974 95 104
    • (1974) J. Cybern. , vol.4 , Issue.1 , pp. 95-104
    • Dunn, J.C.1
  • 37
    • 84887824664 scopus 로고    scopus 로고
    • A hybrid network intrusion detection framework based on random forests and weighted k-means
    • Reda M. Elbasiony, Elsayed A. Sallam, Tarek E. Eltobely, and Mahmoud M. Fahmy A hybrid network intrusion detection framework based on random forests and weighted k-means Ain Shams Eng. J. 4 4 2013 753 762
    • (2013) Ain Shams Eng. J. , vol.4 , Issue.4 , pp. 753-762
    • Elbasiony, R.M.1    Sallam, E.A.2    Eltobely, T.E.3    Fahmy, M.M.4
  • 40
    • 77954816351 scopus 로고    scopus 로고
    • An ensemble-based evolutionary framework for coping with distributed intrusion detection
    • Gianluigi Folino, Clara Pizzuti, and Giandomenico Spezzano An ensemble-based evolutionary framework for coping with distributed intrusion detection Genet. Program. Evol. Mach. 11 June (2) 2010 131 146
    • (2010) Genet. Program. Evol. Mach. , vol.11 , Issue.2 JUNE , pp. 131-146
    • Folino, G.1    Pizzuti, C.2    Spezzano, G.3
  • 43
    • 21244468777 scopus 로고    scopus 로고
    • Combining multiple clusterings using evidence accumulation
    • Ana L.N. Fred, and Anil K. Jain Combining multiple clusterings using evidence accumulation IEEE Trans. Pattern Anal. Mach. Intell. 27 6 2005 835 850
    • (2005) IEEE Trans. Pattern Anal. Mach. Intell. , vol.27 , Issue.6 , pp. 835-850
    • Fred, A.L.N.1    Jain, A.K.2
  • 45
    • 35348821822 scopus 로고    scopus 로고
    • Intrusion detection in computer networks by a modular ensemble of one-class classifiers
    • Special Issue on Applications of Ensemble Methods
    • Giorgio Giacinto, Roberto Perdisci, Mauro Del Rio, and Fabio Roli Intrusion detection in computer networks by a modular ensemble of one-class classifiers Inf. Fusion 9 1 2008 69 82 Special Issue on Applications of Ensemble Methods
    • (2008) Inf. Fusion , vol.9 , Issue.1 , pp. 69-82
    • Giacinto, G.1    Perdisci, R.2    Del Rio, M.3    Roli, F.4
  • 47
    • 77956613687 scopus 로고    scopus 로고
    • A novel intrusion detection system based on hierarchical clustering and support vector machines
    • Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, and Citra Dwi Perkasa A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Syst. Appl. 38 1 2011 306 313
    • (2011) Expert Syst. Appl. , vol.38 , Issue.1 , pp. 306-313
    • Horng, S.-J.1    Su, M.-Y.2    Chen, Y.-H.3    Kao, T.-W.4    Chen, R.-J.5    Lai, J.-L.6    Dwi Perkasa, C.7
  • 48
    • 84891062279 scopus 로고    scopus 로고
    • Online Adaboost-based parameterized methods for dynamic distributed network intrusion detection
    • Weiming Hu, Jun Gao, Yanguo Wang, Ou Wu, and S. Maybank Online Adaboost-based parameterized methods for dynamic distributed network intrusion detection IEEE Trans. Cybern. 44 January (1) 2014 66 82
    • (2014) IEEE Trans. Cybern. , vol.44 , Issue.1 JANUARY , pp. 66-82
    • Hu, W.1    Gao, J.2    Wang, Y.3    Wu, O.4    Maybank, S.5
  • 49
    • 84940768710 scopus 로고    scopus 로고
    • Parallel ensemble of online sequential extreme learning machine based on MapReduce
    • Shan Huang, Botao Wang, Junhao Qiu, Jitao Yao, Guoren Wang, and Ge Yu Parallel ensemble of online sequential extreme learning machine based on MapReduce Neurocomputing 174 Part A 2016 352 367
    • (2016) Neurocomputing , vol.174 , pp. 352-367
    • Huang, S.1    Wang, B.2    Qiu, J.3    Yao, J.4    Wang, G.5    Yu, G.6
  • 50
    • 85004899658 scopus 로고
    • Quadratic assignment as a general data analysis strategy
    • Lawrence Hubert, and James Schultz Quadratic assignment as a general data analysis strategy Br. J. Math. Stat. Psychol. 29 2 1976 190 241
    • (1976) Br. J. Math. Stat. Psychol. , vol.29 , Issue.2 , pp. 190-241
    • Hubert, L.1    Schultz, J.2
  • 51
    • 38149142569 scopus 로고    scopus 로고
    • Comparing anomaly detection techniques for HTTP
    • Kruegel, Christopher, Lippmann, Richard, Clark, Andrew (Eds.) Springer, Berlin, Heidelberg
    • Ingham, Kenneth L., Inoue, Hajime, 2007. Comparing anomaly detection techniques for HTTP. In: Kruegel, Christopher, Lippmann, Richard, Clark, Andrew (Eds.), Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 4637. Springer, Berlin, Heidelberg, pp. 42-62.
    • (2007) Recent Advances in Intrusion Detection. Lecture Notes in Computer Science , vol.4637 , pp. 42-62
    • Ingham, K.L.1    Inoue, H.2
  • 53
    • 0027601884 scopus 로고
    • ANFIS: Adaptive-network-based fuzzy inference system
    • J.-S.R. Jang ANFIS: adaptive-network-based fuzzy inference system IEEE Trans. Syst. Man Cybern. 23 May (3) 1993 665 685
    • (1993) IEEE Trans. Syst. Man Cybern. , vol.23 , Issue.3 MAY , pp. 665-685
    • Jang, J.-S.R.1
  • 55
    • 77956590229 scopus 로고    scopus 로고
    • Unsupervised anomaly detection based on clustering and multiple one-class SVM
    • Song Jungsuk, Hiroki Takakura, Yasuo Okabe, and Kwon Yongjin Unsupervised anomaly detection based on clustering and multiple one-class SVM IEICE Trans. Commun. 92 6 2009 1981 1990
    • (2009) IEICE Trans. Commun. , vol.92 , Issue.6 , pp. 1981-1990
    • Jungsuk, S.1    Takakura, H.2    Okabe, Y.3    Yongjin, K.4
  • 57
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • R.A. Kemmerer, and G. Vigna Intrusion detection: a brief history and overview Computer 35 April (4) 2002 27 30
    • (2002) Computer , vol.35 , Issue.4 APRIL , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 58
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • Jeffrey O. Kephart, and David M. Chess The vision of autonomic computing Computer 36 January (1) 2003 41 50
    • (2003) Computer , vol.36 , Issue.1 JANUARY , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 59
    • 49749119545 scopus 로고    scopus 로고
    • Control theoretic approach to intrusion detection using a distributed hidden Markov model
    • R. Khanna, and Huaping Liu Control theoretic approach to intrusion detection using a distributed hidden Markov model IEEE Wireless Commun. 15 August (4) 2008 24 33
    • (2008) IEEE Wireless Commun. , vol.15 , Issue.4 AUGUST , pp. 24-33
    • Khanna, R.1    Liu, H.2
  • 61
    • 0001927585 scopus 로고
    • On information and sufficiency
    • 03
    • S. Kullback, and R.A. Leibler On information and sufficiency Ann. Math. Stat. 22 1 1951 79 86 03
    • (1951) Ann. Math. Stat. , vol.22 , Issue.1 , pp. 79-86
    • Kullback, S.1    Leibler, R.A.2
  • 62
    • 79957736179 scopus 로고    scopus 로고
    • Distributed denial of service attack detection using an ensemble of neural classifier
    • P.Arun Raj Kumar, and S. Selvakumar Distributed denial of service attack detection using an ensemble of neural classifier Comput. Commun. 34 11 2011 1328 1341
    • (2011) Comput. Commun. , vol.34 , Issue.11 , pp. 1328-1341
    • Kumar, P.A.R.1    Selvakumar, S.2
  • 63
    • 84872155077 scopus 로고    scopus 로고
    • Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
    • P.Arun Raj Kumar, and S. Selvakumar Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Comput. Commun. 36 3 2013 303 319
    • (2013) Comput. Commun. , vol.36 , Issue.3 , pp. 303-319
    • Kumar, P.A.R.1    Selvakumar, S.2
  • 65
    • 33845474264 scopus 로고    scopus 로고
    • A parallel intrusion detection system for high-speed networks
    • Jakobsson, Markus, Yung, Moti, Zhou, Jianying (Eds.) Springer, Berlin, Heidelberg
    • Lai, Haiguang, Cai, Shengwen, Huang, Hao, Xie, Junyuan, Li, Hui, 2004. A parallel intrusion detection system for high-speed networks. In: Jakobsson, Markus, Yung, Moti, Zhou, Jianying (Eds.), Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 3089. Springer, Berlin, Heidelberg, pp. 439-451.
    • (2004) Applied Cryptography and Network Security, Lecture Notes in Computer Science , vol.3089 , pp. 439-451
    • Lai, H.1    Cai, S.2    Huang, H.3    Xie, J.4    Li, H.5
  • 66
    • 0036161242 scopus 로고    scopus 로고
    • Text categorization with support vector machines. How to represent texts in input space
    • Edda Leopold, and Jörg Kindermann Text categorization with support vector machines. How to represent texts in input space Mach. Learn. 46 1-3 2002 423 444
    • (2002) Mach. Learn. , vol.46 , Issue.1-3 , pp. 423-444
    • Leopold, E.1    Kindermann, J.2
  • 67
    • 84868695480 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters
    • Australian Computer Society, Inc., Darlinghurst, Australia
    • Leung, Kingsly, Leckie, Christopher, 2005. Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-eighth Australasian Conference on Computer Science, ACSC '05, vol. 38. Australian Computer Society, Inc., Darlinghurst, Australia, pp. 333-342.
    • (2005) Proceedings of the Twenty-eighth Australasian Conference on Computer Science, ACSC '05 , vol.38 , pp. 333-342
    • Leung, K.1    Leckie, C.2
  • 68
    • 0034247885 scopus 로고    scopus 로고
    • Sequential Karhunen-Loeve basis extraction and its application to images
    • A. Levey, and M. Lindenbaum Sequential Karhunen-Loeve basis extraction and its application to images IEEE Trans. Image Process. 9 August (8) 2000 1371 1374
    • (2000) IEEE Trans. Image Process. , vol.9 , Issue.8 AUGUST , pp. 1371-1374
    • Levey, A.1    Lindenbaum, M.2
  • 69
    • 34047174077 scopus 로고    scopus 로고
    • A fast and accurate online sequential learning algorithm for feedforward networks
    • Nan-Ying Liang, Guang-Bin Huang, Paramasivan Saratchandran, and Narasimhan Sundararajan A fast and accurate online sequential learning algorithm for feedforward networks IEEE Trans. Neural Netw. 17 6 2006 1411 1423
    • (2006) IEEE Trans. Neural Netw. , vol.17 , Issue.6 , pp. 1411-1423
    • Liang, N.-Y.1    Huang, G.-B.2    Saratchandran, P.3    Sundararajan, N.4
  • 70
    • 35148838877 scopus 로고
    • The weighted majority algorithm
    • Nick Littlestone, and Manfred K. Warmuth The weighted majority algorithm Inf. Comput. 108 February (2) 1994 212 261
    • (1994) Inf. Comput. , vol.108 , Issue.2 FEBRUARY , pp. 212-261
    • Littlestone, N.1    Warmuth, M.K.2
  • 72
    • 34247342888 scopus 로고    scopus 로고
    • An analysis of distributed sensor data aggregation for network intrusion detection
    • Special Issue with selected papers from the 11th IEEE Symposium on Computers and Communications (ISCC'06).
    • McEachen, John C., Wai Kah, Cheng, 2007. An analysis of distributed sensor data aggregation for network intrusion detection. Microprocess. Microsyst. 31(4), 263-272. Special Issue with selected papers from the 11th IEEE Symposium on Computers and Communications (ISCC'06).
    • (2007) Microprocess. Microsyst. , vol.31 , Issue.4 , pp. 263-272
    • McEachen, J.C.1    Cheng, W.K.2
  • 73
    • 1542492748 scopus 로고    scopus 로고
    • Identifying significant features for network forensic analysis using artificial intelligent techniques
    • Srinivas Mukkamala, and Andrew H. Sung Identifying significant features for network forensic analysis using artificial intelligent techniques Int. J. Digit. Evid. 1 4 2003 1 17
    • (2003) Int. J. Digit. Evid. , vol.1 , Issue.4 , pp. 1-17
    • Mukkamala, S.1    Sung, A.H.2
  • 75
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • May
    • Newsome, J., Karp, B., Song, D., 2005. Polygraph: automatically generating signatures for polymorphic worms. In: 2005 IEEE Symposium on Security and Privacy, May, pp. 226-241.
    • (2005) 2005 IEEE Symposium on Security and Privacy , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 77
    • 84962165638 scopus 로고    scopus 로고
    • Machine learning based research for network intrusion detection: A state-of-the-art
    • Kanubhai Patel, and Bharat V. Buddhadev Machine learning based research for network intrusion detection: a state-of-the-art Int. J. Inf. Netw. Secur. 3 3 2014
    • (2014) Int. J. Inf. Netw. Secur. , vol.3 , Issue.3
    • Patel, K.1    Buddhadev, B.V.2
  • 78
    • 61749083929 scopus 로고    scopus 로고
    • McPAD: A multiple classifier system for accurate payload-based anomaly detection
    • Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, and Wenke Lee McPAD: a multiple classifier system for accurate payload-based anomaly detection Comput. Netw. 53 6 2009 864 881
    • (2009) Comput. Netw. , vol.53 , Issue.6 , pp. 864-881
    • Perdisci, R.1    Ariu, D.2    Fogla, P.3    Giacinto, G.4    Lee, W.5
  • 79
    • 84875216992 scopus 로고    scopus 로고
    • Scalable fine-grained behavioral clustering of http-based malware
    • Roberto Perdisci, Davide Ariu, and Davide Giacinto Scalable fine-grained behavioral clustering of http-based malware Comput. Netw. 57 2 2013 487 500
    • (2013) Comput. Netw. , vol.57 , Issue.2 , pp. 487-500
    • Perdisci, R.1    Ariu, D.2    Giacinto, D.3
  • 81
    • 84962139445 scopus 로고    scopus 로고
    • Anomaly based intrusion detection - A review
    • Abhinav S. Raut, and Kavita R. Singh Anomaly based intrusion detection - a review Int. J. Netw. Secur. 5 2014
    • (2014) Int. J. Netw. Secur. , vol.5
    • Raut, A.S.1    Singh, K.R.2
  • 82
    • 84943274699 scopus 로고
    • A direct adaptive method for faster backpropagation learning: The RPROP algorithm
    • Riedmiller, M., Braun, H., 1993. A direct adaptive method for faster backpropagation learning: the RPROP algorithm. In: IEEE International Conference on Neural Networks, vol. 1, pp. 586-591.
    • (1993) IEEE International Conference on Neural Networks , vol.1 , pp. 586-591
    • Riedmiller, M.1    Braun, H.2
  • 83
    • 0023453329 scopus 로고
    • Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
    • 0
    • Peter J. Rousseeuw Silhouettes: a graphical aid to the interpretation and validation of cluster analysis J. Comput. Appl. Math. 20 0 1987 53 65
    • (1987) J. Comput. Appl. Math. , vol.20 , pp. 53-65
    • Rousseeuw, P.J.1
  • 85
    • 0025448521 scopus 로고
    • The strength of weak learnability
    • R.E. Schapire The strength of weak learnability Mach. Learn. 5 2 1990 197 227
    • (1990) Mach. Learn. , vol.5 , Issue.2 , pp. 197-227
    • Schapire, R.E.1
  • 86
    • 58149321460 scopus 로고
    • Boosting a weak learning by majority
    • R.E. Schapire Boosting a weak learning by majority Inf. Comput. 121 2 1995 256 285
    • (1995) Inf. Comput. , vol.121 , Issue.2 , pp. 256-285
    • Schapire, R.E.1
  • 88
    • 27744553952 scopus 로고    scopus 로고
    • A Neyman-Pearson approach to statistical learning
    • C. Scott, and R. Nowak A Neyman-Pearson approach to statistical learning IEEE Trans. Inf. Theory 51 November (11) 2005 3806 3819
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.11 NOVEMBER , pp. 3806-3819
    • Scott, C.1    Nowak, R.2
  • 89
    • 81855221688 scopus 로고    scopus 로고
    • Decision tree based light weight intrusion detection using a wrapper approach
    • Siva S. Sivatha Sindhu, S. Geetha, and A. Kannan Decision tree based light weight intrusion detection using a wrapper approach Expert Syst. Appl. 39 1 2012 129 141
    • (2012) Expert Syst. Appl. , vol.39 , Issue.1 , pp. 129-141
    • Sivatha Sindhu, S.S.1    Geetha, S.2    Kannan, A.3
  • 90
    • 84940460812 scopus 로고    scopus 로고
    • An intrusion detection system using network traffic profiling and online sequential extreme learning machine
    • Raman Singh, Harish Kumar, and R.K. Singla An intrusion detection system using network traffic profiling and online sequential extreme learning machine Expert Syst. Appl. 42 22 2015 8609 8624
    • (2015) Expert Syst. Appl. , vol.42 , Issue.22 , pp. 8609-8624
    • Singh, R.1    Kumar, H.2    Singla, R.K.3
  • 91
    • 84874114774 scopus 로고    scopus 로고
    • Toward a more practical unsupervised anomaly detection system
    • 0 Data Mining for Information Security
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe, and Koji Nakao Toward a more practical unsupervised anomaly detection system Inf. Sci. 231 0 2013 4 14 Data Mining for Information Security
    • (2013) Inf. Sci. , vol.231 , pp. 4-14
    • Song, J.1    Takakura, H.2    Okabe, Y.3    Nakao, K.4
  • 92
    • 85180633963 scopus 로고    scopus 로고
    • Spectrogram: A mixture-of-Markov-chains model for anomaly detection in web traffic
    • February 8-11, Internet Society, San Diego, CA
    • Song, Yingbo, Keromytis, Angelos D., Stolfo, Salvatore, 2009. Spectrogram: a mixture-of-Markov-chains model for anomaly detection in web traffic. In: Network and Distributed System Security Symposium 2009. Proceedings, February 8-11, Internet Society, San Diego, CA, pp. 121-135.
    • (2009) Network and Distributed System Security Symposium 2009. Proceedings , pp. 121-135
    • Song, Y.1    Keromytis, A.D.2    Stolfo, S.3
  • 98
    • 33745641552 scopus 로고    scopus 로고
    • Anomalous payload-based worm detection and signature generation
    • Valdes Alfonso, Zamboni Diego (Eds.) Springer, Berlin, Heidelberg, 2006
    • Wang, Ke, Cretu, Gabriela, Stolfo Salvatore J., 2006. Anomalous payload-based worm detection and signature generation. In: Valdes Alfonso, Zamboni Diego (Eds.), Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 3858. Springer, Berlin, Heidelberg, 2006. pp. 227-246.
    • (2006) Recent Advances in Intrusion Detection. Lecture Notes in Computer Science , vol.3858 , pp. 227-246
    • Wang, K.1    Cretu, G.2    Stolfo, S.J.3
  • 99
    • 33750335757 scopus 로고    scopus 로고
    • Anagram: A content anomaly detector resistant to mimicry attack
    • Springer, Hamburg, Germany
    • Wang, Ke, Parekh, Janak J, Stolfo, Salvatore J., 2006. Anagram: a content anomaly detector resistant to mimicry attack. In: Recent Advances in Intrusion Detection. Springer, Hamburg, Germany, pp. 226-248.
    • (2006) Recent Advances in Intrusion Detection , pp. 226-248
    • Wang, K.1    Parekh, J.J.2    Stolfo, S.J.3
  • 100
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Erland, Jonsson, Alfonso, Valdes, Magnus, Almgren, (Eds.) Springer, Berlin, Heidelberg
    • Wang, Ke, Stolfo, Salvatore J., 2004. Anomalous payload-based network intrusion detection. In: Erland, Jonsson, Alfonso, Valdes, Magnus, Almgren, (Eds.), Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 3224. Springer, Berlin, Heidelberg, pp. 203-222.
    • (2004) Recent Advances in Intrusion Detection. Lecture Notes in Computer Science , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 101
    • 84908477169 scopus 로고    scopus 로고
    • Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
    • Wei Wang, Thomas Guyet, René Quiniou, and Marie-Odile Cordier Autonomic intrusion detection: adaptively detecting anomalies over unlabeled audit data streams in computer networks Knowledge-Based Syst. 70 0 2014 103 117
    • (2014) Knowledge-Based Syst. , vol.70 , pp. 103-117
    • Wang, W.1    Guyet, T.2    Quiniou, R.3    Cordier, M.-O.4
  • 102
    • 84861334189 scopus 로고
    • Data Mining: Practical Machine Learning Tools and Techniques: Practical Machine Learning Tools and Techniques
    • Elsevier Science.
    • Witten, I.H., Frank, E., Hall, M.A., 1991. Data Mining: Practical Machine Learning Tools and Techniques: Practical Machine Learning Tools and Techniques. The Morgan Kaufmann Series in Data Management Systems. Elsevier Science.
    • (1991) The Morgan Kaufmann Series in Data Management Systems
    • Witten, I.H.1    Frank, E.2    Hall, M.A.3
  • 103
    • 0026204245 scopus 로고
    • A validity measure for fuzzy clustering
    • Xuanli Lisa Xie, and G. Beni A validity measure for fuzzy clustering IEEE Trans. Pattern Anal. Mach. Intell. 13 August (8) 1991 841 847
    • (1991) IEEE Trans. Pattern Anal. Mach. Intell. , vol.13 , Issue.8 AUGUST , pp. 841-847
    • Xie, X.L.1    Beni, G.2
  • 104
    • 42549142161 scopus 로고    scopus 로고
    • Anomaly based network intrusion detection with unsupervised outlier detection
    • June
    • Zhang, Jiong, Zulkernine, M., 2006. Anomaly based network intrusion detection with unsupervised outlier detection. In: ICC'06. IEEE International Conference on Communications, vol. 5, June, pp. 2388-2393.
    • (2006) ICC'06. IEEE International Conference on Communications , vol.5 , pp. 2388-2393
    • Zhang, J.1    Zulkernine, M.2
  • 106
    • 0030157145 scopus 로고    scopus 로고
    • Birch: An efficient data clustering method for very large databases
    • ACM
    • Zhang, Tian, Ramakrishnan, Raghu, Livny, Miron, 1996. Birch: an efficient data clustering method for very large databases. In: ACM SIGMOD Record, vol. 25. ACM, pp. 103-114.
    • (1996) ACM SIGMOD Record , vol.25 , pp. 103-114
    • Zhang, T.1    Ramakrishnan, R.2    Livny, M.3
  • 108
    • 67649509485 scopus 로고    scopus 로고
    • Decentralized multi-dimensional alert correlation for collaborative intrusion detection
    • Chenfeng Vincent Zhou, Christopher Leckie, and Shanika Karunasekera Decentralized multi-dimensional alert correlation for collaborative intrusion detection J. Netw. Comput. Appl. 32 5 2009 1106 1123
    • (2009) J. Netw. Comput. Appl. , vol.32 , Issue.5 , pp. 1106-1123
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 109
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • Chenfeng Vincent Zhou, Christopher Leckie, and Shanika Karunasekera A survey of coordinated attacks and collaborative intrusion detection Comput. Secur. 29 1 2010 124 140
    • (2010) Comput. Secur. , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.