Network Traffic Classification - Construction of IDS using Machine Learning Approaches
Abstract
Keywords
Full Text:
PDFReferences
Faizal, M.A., Mohd Zaki M., Shahrin Sahib, Robiah, Y., Siti Rahayu, S., and Asrul Hadi, Y. "Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System", Second International Conference on Network Applications, Protocols and Services, IEEE, 2010.
Cuppen, F. & Miege, A. (2002). Alert Correlation in a Cooperative Intrusion Detection Framewok. In Proceeding of the 2002 IEEE Symposium on Security and Privacy. IEEE, 2002.
Cabrera, J.B.D., Ravichandran, B & Mehra R.K. (2000). Statistical Traffic Modelling for Network Intrusion Detection. In Proceeding of the IEEE Conference.
A. Lazarevic, A. Ozgur, L. Ertoz, J. Srivastava, and V. Kumar, “A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection” , Proceedings of SIAM International Confonference on Data Mining, May 2003.
Suseela T.Sarasamma , Quiming A.Zhu , and Julie Huff , “ Hierarchial KMeans+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Meaohenen net for anomaly detection in network security “, IEEE Trans.Syst.,Man and Cybern., vol.35, no.2,pp.302,Apr.2005.
M. Thottan and C. Ji, “Anomaly Detection in IP Networks,” IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2191-2204, May.2003.
C. Kruegel and G. Vigna, “Anomaly Detection of Web-Based Attacks,” Proc. ACM Conf. Computer and Comm. Security, Oct. 2003.
Z. Zhang, J. Li, C.N. Manikopoulos, J. Jorgenson, and J. Ucles,“HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification,” Proc. 2001 IEEE Workshop Information Assurance, pp. 85-90, June 2001.
S.T. Sarasamma, Q.A. Zhu, and J. Huff, “Hierarchical Kohonen Net for Anomaly Detection in Network Security,” IEEE Trans.Systems, Man, and Cybernetics-Part B, vol. 35, no. 2, pp.450,Apr. 2005.
J. Gomez and D.D. Gup ta, “Evolving Fuzzy Classifiers for Intrusion Detection,” Proc. 2002 IEEE Workshop Information Assurance, June 2001. A. Ray, “Symbolic Dynamic Analysis of Complex Systems for Anomaly Detection,” Signal Processing, vol. 84, no. 7, pp. 1115-1130, 2004.
N. Ye, S.M. Emran, Q. Chen, and S. Vilbert, “Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection,” IEEE Trans. Computers, vol. 51, no. 7, pp. 810-820, 2002.
H.S. Javitz and A. Valdes, “The SRI IDES Statistical Anomaly Detector,” Proc. IEEE Symp. Security and Privacy, Vol.87,no.7,pp. 316-326, May 1991.
J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, “On Combining Classifiers,” IEEE Trans. Pattern Analysis and Machine Intelligence,vol. 20, no. 3, pp. 226-239, Mar. 1998.
L.I. Kuncheva, “Switching between Selection and Fusion in Combining Classifiers: An Experiment,” IEEE Trans. Systems, Man, and Cybernetics, vol. 32, no. 2, pp. 146-156, Apr. 2002.
R.P. Lippman, D.J. Fried, I. Graf, J. Haines, K. Kendall, D.McClung, D. Weber, S. Webster, D. Wyschogrod, R.K. Cunningham, and M.A. Zissman, “Evaluating Intrusion Detection Systems:The 1998 DARPA Off-Line Intrusion Detection Evaluation,” Proc.DARPA Information Survivability Conf. and Exposition (DISCEX ‟00), pp. 12-26, Jan. 2000.
The third international knowledge discovery and data mining tools competition dataset KDD99-Cup, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.