The use of artificial intelligence based techniques for intrusion detection: a review

作者: Gulshan Kumar , Krishan Kumar , Monika Sachdeva

DOI: 10.1007/S10462-010-9179-5

关键词:

摘要: … In literature, different types of techniques from various disciplines have been applied to … In order to apply this approach to ID, we would have to introduce data representing attacks and …

参考文章(71)
Eric A. Brewer, David Wagner, Ian Goldberg, Randi Thomas, A secure environment for untrusted helper applications confining the Wily Hacker usenix security symposium. pp. 1- 1 ,(1996)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
Gary Stoneburner, SP 800-33. Underlying Technical Models for Information Technology Security National Institute of Standards & Technology. ,(2001)
Heikki Mannila, Hannu Toivonen, Discovering generalized episodes using minimal occurrences knowledge discovery and data mining. pp. 146- 151 ,(1996)
Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Anazida Zainal, Ensemble classifiers for network intrusion detection system Dynamic Pub.. ,(2009)
Andrew Hay, Daniel Cid, Rory Bray, OSSEC Host-Based Intrusion Detection Guide ,(2008)
Eugene H. Spafford, Mark Crosbie, Active Defense of a Computer System using Autonomous Agents ,(1995)