Dynamic learning model update of hybrid-classifiers for intrusion detection

作者: Jaeik Cho , Taeshik Shon , Ken Choi , Jongsub Moon

DOI: 10.1007/S11227-011-0698-X

关键词: Intrusion detection systemSignature (logic)Dynamic learningData setPattern recognition (psychology)Artificial intelligenceNetwork securityMachine learningComputer scienceData mining

摘要: Machine Learning as network attack detection is one of the popular methods researched. Signature based no longer convinced efficiency in diversified intrusions (Limmer and Dressler 17th ACM Conference on Computer Communication Security, 2010). Moreover, various Zero-day attacks, non notified attacks cannot be detected (Wu Banzhaf Appl Soft Comput 10(1):1---35, This paper suggests an effective update method data set to detect attacks. In addition, this compares verifies effects Detection with updated former methods.

参考文章(10)
Zili Zhang, Chengqi Zhang, 8 Agent-Based Hybrid Intelligent System for Data Mining Springer Berlin Heidelberg. pp. 127- 142 ,(2004) , 10.1007/978-3-540-24623-7_8
Ajith Abraham, Neuro Fuzzy Systems: Sate-of-the-Art Modeling Techniques international work conference on artificial and natural neural networks. ,vol. 2084, pp. 269- 276 ,(2001) , 10.1007/3-540-45720-8_30
Tobias Limmer, Falko Dressler, Dialog-based payload aggregation for intrusion detection computer and communications security. pp. 708- 710 ,(2010) , 10.1145/1866307.1866405
Kamal M. Ali, Michael J. Pazzani, Error reduction through learning multiple descriptions Machine Learning. ,vol. 24, pp. 173- 202 ,(1996) , 10.1023/A:1018249309965
M. Govindarajan, RM. Chandrasekaran, Intrusion detection using neural based hybrid classification methods Computer Networks. ,vol. 55, pp. 1662- 1671 ,(2011) , 10.1016/J.COMNET.2010.12.008
Luh Yen, Marco Saerens, Francois Fouss, A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases IEEE Transactions on Knowledge and Data Engineering. ,vol. 23, pp. 481- 495 ,(2011) , 10.1109/TKDE.2010.142
Michael Greenacre, Correspondence analysis of raw data Ecology. ,vol. 91, pp. 958- 963 ,(2010) , 10.1890/09-0239.1
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken, Community epidemic detection using time-correlated anomalies recent advances in intrusion detection. pp. 360- 381 ,(2010) , 10.1007/978-3-642-15512-3_19
Shelly Xiaonan Wu, Wolfgang Banzhaf, The use of computational intelligence in intrusion detection systems: A review Applied Soft Computing. ,vol. 10, pp. 1- 35 ,(2010) , 10.1016/J.ASOC.2009.06.019