A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
暂无分享,去创建一个
[1] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[2] Zhang Yi,et al. A hierarchical intrusion detection model based on the PCA neural networks , 2007, Neurocomputing.
[3] Gregory B. White,et al. Principles of Computer Security: Security+ and Beyond , 2004 .
[4] Kotagiri Ramamohanarao,et al. Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.
[5] Adel Nadjaran Toosi,et al. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..
[6] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[7] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[8] Choo-Yee Ting,et al. Forming an optimal feature set for classifying network intrusions involving multiple feature selection methods , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[9] Frédéric Cuppens,et al. Detecting Known and Novel Network Intrusions , 2006, SEC.
[10] Somnuk Phon-Amnuaisuk,et al. Comparing Single and Multiple Bayesian Classifiers Approaches for Network Intrusion Detection , 2010, 2010 Second International Conference on Computer Engineering and Applications.
[11] Yuehui Chen,et al. Hybrid flexible neural-tree-based intrusion detection systems: Research Articles , 2007 .
[12] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[13] Somnuk Phon-Amnuaisuk,et al. A Probabilistic Approach for Network Intrusion Detection , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).
[14] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[15] Sam Kwong,et al. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.
[16] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[17] Xiangliang Zhang,et al. A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security , 2004, ISNN.
[18] S. Srinoy,et al. Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.
[19] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[20] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.
[21] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[22] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[23] A. Abraham,et al. Intrusion Detection Systems Using Decision Trees and Support Vector Machines , 2004 .
[24] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[25] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[26] Ian Witten,et al. Data Mining , 2000 .
[27] Choo-Yee Ting,et al. A Feature Selection Approach for Network Intrusion Detection , 2009, 2009 International Conference on Information Management and Engineering.
[28] Yang Li,et al. Building lightweight intrusion detection system using wrapper-based feature selection mechanisms , 2009, Comput. Secur..
[29] Zhengxin Chen,et al. Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection , 2009, Inf. Sci..
[30] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[31] Shu-Ching Chen,et al. Principal Component-based Anomaly Detection Scheme , 2006, Foundations and Novel Approaches in Data Mining.
[32] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[33] Mohammad Saniee Abadeh,et al. A parallel genetic local search algorithm for intrusion detection in computer networks , 2007, Eng. Appl. Artif. Intell..
[34] Fabio Roli,et al. Intrusion Detection in Computer Systems Using Multiple Classifier Systems , 2008 .
[35] Tao Li,et al. A novel intrusion detection approach learned from the change of antibody concentration in biological immune response , 2011, Applied Intelligence.
[36] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[37] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[38] Fabio Roli,et al. Intrusion detection in computer networks by a modular ensemble of one-class classifiers , 2008, Inf. Fusion.
[39] Tansel Özyer,et al. Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening , 2007, J. Netw. Comput. Appl..
[40] Wei Hu,et al. AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[41] Bernhard Pfahringer,et al. Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.
[42] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .