메뉴 건너뛰기




Volumn , Issue , 2015, Pages

A deep learning approach for network intrusion detection system

Author keywords

Deep learning; Network security; NIDS; NSL KDD; Sparse autoencoder

Indexed keywords

COMPUTER CRIME; INTRUSION DETECTION; NETWORK SECURITY;

EID: 85042182032     PISSN: None     EISSN: 24116777     Source Type: Conference Proceeding    
DOI: 10.4108/eai.3-12-2015.2262516     Document Type: Conference Paper
Times cited : (276)

References (22)
  • 1
    • 85034572289 scopus 로고    scopus 로고
    • Snort, "https://www.snort.org/..
    • Snort
  • 2
    • 84884203185 scopus 로고    scopus 로고
    • Network anomaly detection with the restricted boltzmann machine
    • U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis, "Network Anomaly Detection with the Restricted Boltzmann Machine, " Neurocomput., vol. 122, pp. 13{23, 2013.
    • (2013) Neurocomput. , vol.122 , pp. 13-23
    • Fiore, U.1    Palmieri, F.2    Castiglione, A.3    De Santis, A.4
  • 3
    • 69249230890 scopus 로고    scopus 로고
    • Intrusion detection by machine learning: A review
    • C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, "Intrusion Detection by Machine Learning: A Review, " Expert Systems with Applications, vol. 36, no. 10, pp. 11994 { 12000, 2009.
    • (2009) Expert Systems with Applications , vol.36 , Issue.10 , pp. 11994-12000
    • Tsai, C.F.1    Hsu, Y.F.2    Lin, C.Y.3    Lin, W.Y.4
  • 10
    • 84859059506 scopus 로고    scopus 로고
    • A hybrid intelligent approach for network intrusion detection
    • M. Panda, A. Abraham, and M. R. Patra, "A Hybrid Intelligent Approach for Network Intrusion Detection, " Procedia Engineering, vol. 30, pp. 1{9, 2012.
    • (2012) Procedia Engineering , vol.30 , pp. 1-9
    • Panda, M.1    Abraham, A.2    Patra, M.R.3
  • 12
    • 84855369803 scopus 로고    scopus 로고
    • Bi-layer behavioral-based feature selection approach for network intrusion classification
    • Springer
    • H. F. Eid, M. A. Salama, A. E. Hassanien, and T. H. Kim, "Bi-layer Behavioral-based Feature Selection Approach for Network Intrusion Classification, " in Security Technology, pp. 195{203, Springer, 2011.
    • (2011) Security Technology , pp. 195-203
    • Eid, H.F.1    Salama, M.A.2    Hassanien, A.E.3    Kim, T.H.4
  • 14
    • 84930358040 scopus 로고    scopus 로고
    • Unsupervised clustering approach for network anomaly detection
    • Springer
    • I. Syarif, A. Prugel-Bennett, and G. Wills, "Unsupervised Clustering Approach for Network Anomaly Detection, " in Networked Digital Technologies, pp. 135{145, Springer, 2012.
    • (2012) Networked Digital Technologies , pp. 135-145
    • Syarif, I.1    Prugel-Bennett, A.2    Wills, G.3
  • 21
    • 85034611931 scopus 로고    scopus 로고
    • Soft-Max Regression, "http://udl.stanford.edu/wiki/index.php/softmaxregression..
    • Soft-Max Regression
  • 22
    • 85034607356 scopus 로고    scopus 로고
    • KDD Cup 99, "http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html..
    • KDD Cup 99


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.