Framework for An Intelligent Rule-Based Network Intrusion Detection System

[1]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[2]  Harold S. Javitz,et al.  The NIDES Statistical Component Description and Justification , 1994 .

[3]  H. Bunke,et al.  Hybrid techniques , 1988 .

[4]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[5]  Jonatan Gómez,et al.  Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .

[6]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[7]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[8]  David Aldous,et al.  The Continuum Random Tree III , 1991 .

[9]  Bernhard Pfahringer,et al.  Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.

[10]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[11]  Ron Kohavi,et al.  Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.

[12]  C. Lucas,et al.  Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..

[13]  Malcolm I. Heywood,et al.  Training genetic programming on half a million patterns: an example from anomaly detection , 2005, IEEE Transactions on Evolutionary Computation.

[14]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[15]  Bruce W. Suter,et al.  The multilayer perceptron as an approximation to a Bayes optimal discriminant function , 1990, IEEE Trans. Neural Networks.

[16]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[17]  Alexander Hofmann,et al.  Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers , 2003, ICANN.

[18]  Ali A. Ghorbani,et al.  Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[19]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[20]  Rachid Beghdad,et al.  Critical study of neural networks in detecting intrusions , 2008, Comput. Secur..

[21]  N. Ye,et al.  A Scalable Clustering Technique for Intrusion Signature Recognition , 2001 .

[22]  Siti Zaiton Mohd Hashim,et al.  Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[23]  Marc Dacier,et al.  Intrusion detection , 1999, Comput. Networks.

[24]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[25]  Pat Langley,et al.  Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.

[26]  Eleazar Eskin,et al.  Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.