A hybrid intrusion detection system: A review
暂无分享,去创建一个
[1] Vinod Kumar,et al. Signature Based Intrusion Detection System Using SNORT , 2012 .
[2] Kapil Keshao Wankhade,et al. An efficient approach for Intrusion Detection using data mining methods , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[3] I. Sumaiya Thaseen,et al. Intrusion detection model using fusion of PCA and optimized SVM , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[4] Kai Li,et al. Research on the intrusion detection technology with hybrid model , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.
[5] M. Hemalatha,et al. Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach , 2013 .
[6] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[7] A. Halim Zaim,et al. A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..
[8] Philip K. Chan,et al. Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.
[9] M. Hemalatha,et al. Effective approach toward Intrusion Detection System using data mining techniques , 2014 .
[10] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[11] Saiyan Saiyod,et al. Improving Intrusion Detection System based on Snort rules for network probe attack detection , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).
[12] Lilly Suriani Affendey,et al. Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[13] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[14] Divya Surender Lakra. HSNORT: A Hybrid Intrusion Detection System using , 2013 .