A Real Time Adaptive Intrusion Detection Alert Classifier for High Speed Networks
暂无分享,去创建一个
Sami Bourouis | Hassen Sallay | Adel Ammar | Majdi Ben Saad | S. Bourouis | Adel Ammar | Hassen Sallay
[1] Xiaojin Zhu,et al. --1 CONTENTS , 2006 .
[2] Hyeran Byun,et al. A Survey on Pattern Recognition Applications of Support Vector Machines , 2003, Int. J. Pattern Recognit. Artif. Intell..
[3] Christin Schäfer,et al. Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.
[4] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[5] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[6] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[7] Alexander Hofmann,et al. On the versatility of radial basis function neural networks: A case study in the field of intrusion detection , 2010, Inf. Sci..
[8] Stefan Rüping,et al. Incremental Learning with Support Vector Machines , 2001, ICDM.
[9] Gert Cauwenberghs,et al. Incremental and Decremental Support Vector Machine Learning , 2000, NIPS.
[10] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[11] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[12] Frédéric Cuppens,et al. Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.
[13] V. Rao Vemuri,et al. Robust Support Vector Machines for Anomaly Detection in Computer Security , 2003, ICMLA.
[14] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.
[15] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.
[16] D. Sculley,et al. Relaxed online SVMs for spam filtering , 2007, SIGIR.
[17] M. Hanock,et al. Online Intrusion Alert Aggregation with Generative Data Stream Modeling , 2013 .
[18] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[19] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[20] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[21] Hiroki Takakura,et al. Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation , 2011, BADGERS '11.
[22] Alexander J. Smola,et al. Online learning with kernels , 2001, IEEE Transactions on Signal Processing.
[23] Nathalie Japkowicz,et al. Using Unsupervised Learning for Network Alert Correlation , 2008, Canadian Conference on AI.
[24] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[25] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[26] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[27] PietraszekTadeusz,et al. Data mining and machine learning-Towards reducing false positives in intrusion detection , 2005 .
[28] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..