Intrusion detection using principal component analysis

作者: Yacine Bouzida , Sylvain Gombault

DOI:

关键词: Artificial intelligenceIntrusion detection systemMathematicsPattern recognitionPrincipal component analysis

摘要:

参考文章(9)
Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu, ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis european symposium on research in computer security. pp. 435- 450 ,(1992) , 10.1007/BFB0013912
O.R. Zaiane, Man Xin, Jiawei Han, Discovering Web access patterns and trends by applying OLAP and data mining technology on Web logs Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-. pp. 19- 29 ,(1998) , 10.1109/ADL.1998.670376
H. Hotelling, Analysis of a complex of statistical variables into principal components. Journal of Educational Psychology. ,vol. 24, pp. 498- 520 ,(1933) , 10.1037/H0071325
Eugene H. Spafford, Sandeep Kumar, A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION ,(1994)
H.S. Vaccaro, G.E. Liepins, Detection of anomalous computer session activity ieee symposium on security and privacy. pp. 280- 289 ,(1989) , 10.1109/SECPRI.1989.36302
H. Debar, M. Becker, D. Siboni, A neural network component for an intrusion detection system ieee symposium on security and privacy. pp. 240- 250 ,(1992) , 10.1109/RISP.1992.213257
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894
K. Ilgun, USTAT: a real-time intrusion detection system for UNIX ieee symposium on security and privacy. pp. 16- 28 ,(1993) , 10.1109/RISP.1993.287646