메뉴 건너뛰기




Volumn 3025, Issue , 2004, Pages 276-281

Feature selection for robust detection of distributed denial-of-service attacks using genetic algorithms

Author keywords

Denial of Service; Genetic Algorithms; Neural Networks

Indexed keywords

CRYPTOGRAPHY; GENETIC ALGORITHMS; NEURAL NETWORKS; PATTERN RECOGNITION; REAL TIME SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); ALGORITHMS; ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; FEATURE EXTRACTION; INTERNET; NETWORK SECURITY; TRANSMISSION CONTROL PROTOCOL;

EID: 9444219650     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-24674-9_29     Document Type: Conference Paper
Times cited : (10)

References (21)
  • 3
    • 84898944587 scopus 로고    scopus 로고
    • Intrusion detection with neural networks
    • M. Jordan et al., Eds., Cambridge, MA: MIT Press
    • J. Ryan, M.J. Lin, R. Miikkulainen, "Intrusion Detection with Neural Networks", in: Advances in Neural Information Processing Systems 10, M. Jordan et al., Eds., Cambridge, MA: MIT Press, 1998 pp. 943-949.
    • (1998) Advances in Neural Information Processing Systems , vol.10 , pp. 943-949
    • Ryan, J.1    Lin, M.J.2    Miikkulainen, R.3
  • 4
    • 0036085392 scopus 로고    scopus 로고
    • Intrusion detection using neural networks and support vector machines
    • Mukkamala, S., Janoski, G., Sung, A.: Intrusion Detection using Neural Networks and Support Vector Machines. Proc. IJCNN, 2 (2002) 1702-1707.
    • (2002) Proc. IJCNN , vol.2 , pp. 1702-1707
    • Mukkamala, S.1    Janoski, G.2    Sung, A.3
  • 9
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using Keyword selection and neural networks
    • Lippmann, R., Cunnigham, R.: Improving intrusion detection performance using Keyword selection and neural networks, Computer Networks, 34 (2000) 596-603.
    • (2000) Computer Networks , vol.34 , pp. 596-603
    • Lippmann, R.1    Cunnigham, R.2
  • 13
    • 9444268284 scopus 로고    scopus 로고
    • System and process for defending against denial of service attacks on network nodes. Patent WO0219661, Top Layer Networks Inc. (USA)
    • Narayanaswamy, K., Ross, T., Spinney, B., Paquette, M., Wright, C.: System and process for defending against denial of service attacks on network nodes. Patent WO0219661, Top Layer Networks Inc. (USA), (2002).
    • (2002)
    • Narayanaswamy, K.1    Ross, T.2    Spinney, B.3    Paquette, M.4    Wright, C.5
  • 15
    • 0002651837 scopus 로고
    • An overview of evolutionary algorithms for parameter optimization
    • Back, T., Schwefel, H.: An overview of evolutionary algorithms for parameter optimization, Evolutionary Computation, 1 (1993) 1-23.
    • (1993) Evolutionary Computation , vol.1 , pp. 1-23
    • Back, T.1    Schwefel, H.2
  • 18
    • 9444245460 scopus 로고    scopus 로고
    • Method for Blocking Denial of Service and Address spoofing attacks on a private network. Patent WO9948303, Cisco Tech Ind (USA)
    • Cox, D., McClanahan, K.: Method for Blocking Denial of Service and Address spoofing attacks on a private network. Patent WO9948303, Cisco Tech Ind (USA), (1999).
    • (1999)
    • Cox, D.1    McClanahan, K.2
  • 19
    • 9444240553 scopus 로고    scopus 로고
    • Method and apparatus for preventing a denial of service (DOS) attack by selectively throttling TCP/IP requests. Patent WO0201834, Sun Microsystems Inc (USA)
    • Belissent, J.: Method and apparatus for preventing a denial of service (DOS) attack by selectively throttling TCP/IP requests. Patent WO0201834, Sun Microsystems Inc (USA), (2002).
    • (2002)
    • Belissent, J.1
  • 20
    • 9444250081 scopus 로고    scopus 로고
    • Method for preventing denial of service attacks. Patent WO0203084, Netrake Corp (USA)
    • Maher, R., Bennett V.: Method for preventing denial of service attacks. Patent WO0203084, Netrake Corp (USA), (2002).
    • (2002)
    • Maher, R.1    Bennett, V.2
  • 21
    • 0032633791 scopus 로고    scopus 로고
    • Surviving denial-of-service
    • Scwartau W.: Surviving denial-of-service. Computers & Security, 18, (1999) 124-133.
    • (1999) Computers & Security , vol.18 , pp. 124-133
    • Scwartau, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.