A machine learning framework for network anomaly detection using SVM and GA
暂无分享,去创建一个
Yongdae Kim | Taeshik Shon | Jongsub Moon | Cheolwon Lee | Yongdae Kim | Jongsub Moon | Taeshik Shon | Cheolwon Lee
[1] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory, Second Edition , 2000, Statistics for Engineering and Information Science.
[2] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[3] Hyeran Byun,et al. A Survey on Pattern Recognition Applications of Support Vector Machines , 2003, Int. J. Pattern Recognit. Artif. Intell..
[4] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[6] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[7] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[8] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[9] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[10] B. Ravichandran,et al. Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[11] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[12] Salvatore J. Stolfo,et al. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses , 2003 .
[13] Marti A. Hearst. Trends & Controversies: Support Vector Machines , 1998, IEEE Intell. Syst..
[14] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[15] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.