Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System
暂无分享,去创建一个
[1] Phurivit Sangkatsanee,et al. Practical real-time intrusion detection using machine learning approaches , 2011, Comput. Commun..
[2] Chaker Katar. Combining Multiple Techniques for Intrusion Detection , 2006 .
[3] Dewan Md. Farid,et al. Attacks classification in adaptive intrusion detection using decision tree , 2010 .
[4] Steven L. Scott,et al. A Bayesian paradigm for designing intrusion detection systems , 2004, Computational Statistics & Data Analysis.
[5] Tansel Özyer,et al. Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening , 2007, J. Netw. Comput. Appl..
[6] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[7] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[8] Wei Xu,et al. Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..
[9] Hamid Mohamadi,et al. Design and analysis of genetic fuzzy systems for intrusion detection in computer networks , 2011, Expert Syst. Appl..
[10] Salvatore J. Stolfo,et al. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions , 2000, Recent Advances in Intrusion Detection.
[11] Ester Yen,et al. Data mining-based intrusion detectors , 2009, Expert Syst. Appl..
[12] Tadeusz Pietraszek,et al. Data mining and machine learning - Towards reducing false positives in intrusion detection , 2005, Inf. Secur. Tech. Rep..
[13] V. Nikulin. Threshold-based clustering with merging and regularization in application to network intrusion detection , 2006, Comput. Stat. Data Anal..
[14] Amutha Prabakar Muniyandi,et al. Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .
[15] Sam Kwong,et al. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.
[16] Evimaria Terzi,et al. Intrusion Detection Technology , 2007 .
[17] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[18] Gisung Kim,et al. Self-adaptive and dynamic clustering for online anomaly detection , 2011, Expert Syst. Appl..
[19] Jian Li,et al. The research and implementation of intelligent intrusion detection system based on artificial neural network , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[20] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[21] A. Halim Zaim,et al. A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..
[22] Ming-Yang Su,et al. Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers , 2011, Expert Syst. Appl..
[23] Ian H. Witten,et al. Weka: Practical machine learning tools and techniques with Java implementations , 1999 .
[24] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[25] Dongjoon Kong,et al. A differentiated one-class classification method with applications to intrusion detection , 2012, Expert Syst. Appl..
[26] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[27] Daoqiang Zhang,et al. Hybrid neural network and C4.5 for misuse detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
[28] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[29] Li Hanguang,et al. Intrusion Detection Technology Research Based on Apriori Algorithm , 2012 .
[30] Adel Nadjaran Toosi,et al. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..
[31] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[32] Hussein A. Abbass,et al. An adaptive genetic-based signature learning system for intrusion detection , 2009, Expert Syst. Appl..
[33] Manas Ranjan Patra,et al. Discriminative multinomial Naïve Bayes for network intrusion detection , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[34] Arputharaj Kannan,et al. Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..
[35] Hui Wang,et al. A clustering-based method for unsupervised intrusion detections , 2006, Pattern Recognit. Lett..
[36] Zhengxin Chen,et al. Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection , 2009, Inf. Sci..
[37] Wei Zhang,et al. A genetic clustering method for intrusion detection , 2004, Pattern Recognit..
[38] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[39] Fabio Roli,et al. Fusion of multiple classifiers for intrusion detection in computer networks , 2003, Pattern Recognit. Lett..
[40] Abdolreza Mirzaei,et al. Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..
[41] Chunlin Zhang,et al. Intrusion detection using hierarchical neural networks , 2005, Pattern Recognit. Lett..