Performance evaluation of intrusion detection based on machine learning using Apache Spark
暂无分享,去创建一个
Salah El Hadaj | Mohamed Idhammad | Mustapha Belouch | S. E. Hadaj | Mustapha Belouch | Mohamed Idhammad
[1] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[2] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[3] Anirban Bhowal,et al. Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection , 2015, 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).
[4] Bayu Adhi Tama,et al. A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection Systems , 2015, CSA/CUTE.
[5] Patrick Wendell,et al. Learning Spark: Lightning-Fast Big Data Analytics , 2015 .
[6] Irving John Good,et al. The Estimation of Probabilities: An Essay on Modern Bayesian Methods , 1965 .
[7] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[8] Deepa Pavithran,et al. A Survey of Intrusion Detection Models based on NSL-KDD Data Set , 2018, 2018 Fifth HCT Information Technology Trends (ITT).
[9] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[10] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[11] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[12] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[13] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[14] Fabio Roli,et al. Intrusion detection in computer networks by a modular ensemble of one-class classifiers , 2008, Inf. Fusion.
[15] Guobin Zhu,et al. Classification using ASTER data and SVM algorithms;: The case study of Beer Sheva, Israel , 2002 .
[16] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[17] Ron Kohavi,et al. Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.
[18] Andy Liaw,et al. Classification and Regression by randomForest , 2007 .
[19] Pat Langley,et al. An Analysis of Bayesian Classifiers , 1992, AAAI.
[20] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.