Class imbalance problem in the Network Intrusion Detection Systems
暂无分享,去创建一个
[1] Sudhir Kumar Sharma,et al. Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection , 2015 .
[2] Gary M. Weiss. Mining with rarity: a unifying framework , 2004, SKDD.
[3] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[4] Wei Hu,et al. AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[5] S. P. Shantharajah,et al. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .
[6] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[7] Dimitris Kanellopoulos,et al. Handling imbalanced datasets: A review , 2006 .
[8] Snehal A. Mulay,et al. Intrusion Detection System using Support Vector Machine and Decision Tree , 2010 .
[9] Gustavo E. A. P. A. Batista,et al. Learning with Skewed Class Distributions , 2002 .
[10] Krunal Panchal,et al. Effective Intrusion Detection System using Data Mining Technique , 2015 .
[11] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[12] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[13] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[14] Yue Wu,et al. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..
[15] Jyoti Yadav,et al. Intrusion Detection System using Data Mining , 2015 .
[16] David A. Cieslak,et al. Combating imbalance in network intrusion datasets , 2006, 2006 IEEE International Conference on Granular Computing.
[17] Vipin Kumar,et al. K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset , 2013 .
[18] Mahdi Zamani,et al. Machine Learning Techniques for Intrusion Detection , 2013, ArXiv.
[19] Santosh Kumar Sahu,et al. A detail analysis on intrusion detection datasets , 2014, 2014 IEEE International Advance Computing Conference (IACC).