A Neural Network-Based Learning Algorithm for Intrusion Detection Systems
暂无分享,去创建一个
Said Fathy El-Zoghdy | Osama S. Faragallah | Hala S. El-sayed | O. S. Faragallah | Nawal A. Elfeshawy | S. F. El-Zoghdy | Hassan I. Ahmed | O. Faragallah | H. El-sayed | Nawal A. Elfeshawy
[1] Xiangliang Zhang,et al. Constructing attribute weights from computer audit data for effective intrusion detection , 2009, J. Syst. Softw..
[2] Li-Yong Ren,et al. Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[3] Philippe Owezarski,et al. Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge , 2012, Comput. Commun..
[4] Zhifeng Chen,et al. Application of PSO-RBF Neural Network in Network Intrusion Detection , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.
[5] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[6] D. S. Yeung,et al. Network intrusion detection in covariance feature space , 2007, Pattern Recognit..
[7] Abdulkader A. Alfantookh,et al. DoS Attacks Intelligent Detection using Neural Networks , 2006, J. King Saud Univ. Comput. Inf. Sci..
[8] Reza Sabzevari,et al. Improvement of learning algorithms for RBF neural networks in a helicopter sound identification system , 2007, Neurocomputing.
[9] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[10] Andrew J. Clark,et al. Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..
[11] V N Dao,et al. Performance of Neural Networks Methods In Intrusion Detection , 2001 .
[12] Balaraman Ravindran,et al. Adaptive network intrusion detection system using a hybrid approach , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[13] Walter D. Potter,et al. LIDS: Learning Intrusion Detection System , 2003, FLAIRS.
[14] Zhi-Hua Hu,et al. An Incremental SVM for Intrusion Detection Based on Key Feature Selection , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.
[15] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[16] Alpa Reshamwala,et al. A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique , 2012 .
[17] Shikha Agrawal,et al. A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques , 2013 .
[18] Rung Ching Chen,et al. Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.
[19] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[20] Hu Zhengbing,et al. An Intelligent Lightweight Intrusion Detection System with Forensics Technique , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[21] Lei Li,et al. A novel rule-based Intrusion Detection System using data mining , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[22] Zehua Chen,et al. An adaptive real-time intrusion detection system using sequences of system call , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[23] Chunhua Gu,et al. A Rough Set and SVM Based Intrusion Detection Classifier , 2009, 2009 Second International Workshop on Computer Science and Engineering.
[24] M. Hemalatha,et al. Effective approach toward Intrusion Detection System using data mining techniques , 2014 .
[25] Ruzhi Xu,et al. Research intrusion detection based PSO-RBF classifier , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.
[26] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[27] Susan C. Lee,et al. Training a neural-network based intrusion detector to recognize novel attacks , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[28] Hari Om,et al. STATISTICAL TECHNIQUES IN ANOMALY INTRUSION DETECTION SYSTEM , 2012 .
[29] Ashraf Darwish,et al. Principle components analysis and Support Vector Machine based Intrusion Detection System , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.
[30] Shingo Mabu,et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[31] Osama S. Faragallah,et al. Divided two-part adaptive intrusion detection system , 2012, Wireless Networks.
[32] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[33] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[34] Miyoung Shin Shin,et al. A Radial Basis Function Approach to Pattern Recognition and Its Applications , 2000 .
[35] Lilly Suriani Affendey,et al. Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[36] Rozaida Ghazali,et al. An Improved Back Propagation Neural Network Algorithm on Classification Problems , 2010, FGIT-DTA/BSBT.
[37] A. Piskozub,et al. Real-Time Intrusion Prevention and Anomaly Analyze System for Corporate Networks , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[38] Qiang Chen,et al. An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems , 2001 .
[39] Hu Zhengbing,et al. A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining , 2008, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008).
[40] Nazri Mohd Nawi,et al. An Improved Conjugate Gradient Based Learning Algorithm for Back Propagation Neural Networks , 2008 .
[41] Karen Scarfone,et al. Intrusion Detection and Prevention Systems , 2010, Handbook of Information and Communication Security.