Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms
暂无分享,去创建一个
[1] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[2] A.N. Zincir-Heywood,et al. On the capability of an SOM based intrusion detection system , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[3] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[4] Andrew Odlyzko,et al. Internet traffic growth: sources and implications , 2003, SPIE ITCom.
[5] D. Vere-Jones. Markov Chains , 1972, Nature.
[6] A. Nur Zincir-Heywood,et al. Generating representative traffic for intrusion detection system benchmarking , 2005, 3rd Annual Communication Networks and Services Research Conference (CNSR'05).
[7] Beat Kleiner,et al. Graphical Methods for Data Analysis , 1983 .
[8] John M. Chambers,et al. Graphical Methods for Data Analysis , 1983 .
[9] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.