Performance analysis of network intrusion detection schemes using Apache Spark
暂无分享,去创建一个
Govind P. Gupta | Manish Kulariya | Priyanka Saraf | Raushan Ranjan | Manish Kulariya | Raushan Ranjan | Priyanka Saraf
[1] Yuan-Cheng Lai,et al. Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems , 2012, IEEE Communications Magazine.
[2] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[3] G Kalyani,et al. Performance Assessment of Different Classification Techniques for Intrusion Detection , 2012 .
[4] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[5] Ralf Klinkenberg,et al. Data Classification: Algorithms and Applications , 2014 .
[6] Xiangjian He,et al. Enhancing Big Data Security with Collaborative Intrusion Detection , 2014, IEEE Cloud Computing.
[7] Mohammad Zulkernine,et al. Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.
[8] Ming-Yuh Huang,et al. A large scale distributed intrusion detection framework based on attack strategy analysis , 1999, Comput. Networks.
[9] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[10] Vipin Kumar,et al. A Comparative Study of Classification Techniques for Intrusion Detection , 2013, 2013 International Symposium on Computational and Business Intelligence.
[11] Deokjai Choi,et al. Application of Data Mining to Network Intrusion Detection: Classifier Selection Model , 2008, APNOMS.
[12] M. Hemalatha,et al. Perspective analysis of machine learning algorithms for detecting network intrusions , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[13] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[14] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .