Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
暂无分享,去创建一个
Sanasam Ranbir Singh | Sukumar Nandi | Ritesh Ratti | Sanasam Ranbir Singh | R. Ratti | Sukumar Nandi
[1] Davy Janssens,et al. Evaluating the performance of cost-based discretization versus entropy- and error-based discretization , 2006, Comput. Oper. Res..
[2] Mamun Bin Ibne Reaz,et al. A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..
[3] Jill Slay,et al. The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[4] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[5] M. Revathi,et al. NETWORK INTRUSION DETECTION SYSTEM USING REDUCED DIMENSIONALITY , 2011 .
[6] Usama M. Fayyad,et al. Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning , 1993, IJCAI.
[7] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[8] Xiangji Huang,et al. Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..
[9] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[10] Kwangjo Kim,et al. Deep Learning in Intrusion Detection System: An Overview , 2016 .
[11] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[12] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[13] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[14] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[15] Gilles Louppe,et al. Independent consultant , 2013 .
[16] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[17] Jian Dai,et al. The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection , 2014, J. Networks.
[18] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[19] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[20] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[21] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[22] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[23] H. Pomares,et al. Statistical analysis of different artificial intelligent techniques applied to Intrusion Detection System , 2012, 2012 International Conference on Multimedia Computing and Systems.
[24] Shoushan Luo,et al. A two-level hybrid approach for intrusion detection , 2016, Neurocomputing.
[25] Wenke Lee,et al. McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.
[26] Francisco Herrera,et al. A Survey of Discretization Techniques: Taxonomy and Empirical Analysis in Supervised Learning , 2013, IEEE Transactions on Knowledge and Data Engineering.