Usage of data mining techniques for analyzing network intrusions
暂无分享,去创建一个
[1] Venu Govindaraju,et al. Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.
[2] Marco Ramilli,et al. Peer-to-Peer Data Mining Classi ers for Decentralized Detection of Network Attacks , 2013, ADC.
[3] S. K. Sharma,et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[4] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[5] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[6] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[7] LiaoYihua. Use of K-Nearest Neighbor classifier for intrusion detection11An earlier version of this paper is to appear in the Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002 , 2002 .
[8] V. Rao Vemuri,et al. Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..
[9] Vineet Richariya,et al. Anomaly Detection in Network using , 2012 .
[10] Mennatallah Amer,et al. Comparison of Unsupervised Anomaly Detection Techniques Bachelor Thesis , 2011 .
[11] Kijoon Chae,et al. Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication , 2009, Int. J. Comput. Sci. Appl..
[12] Jaideep Srivastava,et al. Detection and Summarization of Novel Network Attacks Using Data Mining , 2003 .