A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems

作者: Tarfa Hamed , Jason B. Ernst , Stefan C. Kremer

DOI: 10.1007/978-3-319-58424-9_7

关键词:

摘要: … because it depends on comparing to known signatures) [51]. … We listed and explained the extracted features from the pre-… Signature-based anomaly intrusion detection using integrated …

参考文章(62)
Sumaiya Thaseen, Ch Aswani Kumar, An analysis of supervised tree based classifiers for intrusion detection system international conference on pattern recognition. pp. 294- 299 ,(2013) , 10.1109/ICPRIME.2013.6496489
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models ieee symposium on security and privacy. pp. 133- 145 ,(1999) , 10.1109/SECPRI.1999.766910
E. Alata, V. Nicomette, M. Kaaniche, M. Dacier, M. Herrb, Lessons learned from the deployment of a high-interaction honeypot european dependable computing conference. pp. 39- 46 ,(2006) , 10.1109/EDCC.2006.17
Vahid Aghaei-Foroushani, A. Nur Zincir-Heywood, On Evaluating IP Traceback Schemes: A Practical Perspective ieee symposium on security and privacy. pp. 127- 134 ,(2013) , 10.1109/SPW.2013.13
Vijay Bhuse, Ajay Gupta, Anomaly intrusion detection in wireless sensor networks Journal of High Speed Networks. ,vol. 15, pp. 33- 51 ,(2006)
Hong-Geun Kim, Dong-Jin Kim, Seong-Je Cho, Moonju Park, Minkyu Park, An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots research in applied computation symposium. pp. 266- 271 ,(2011) , 10.1145/2103380.2103435
J.L Rana, RC Jain, K K Pandey, Vineet Richharya, Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques IJRCCT. ,vol. 2, pp. 126- 130 ,(2013)
Bhopal India, Rajiv Gandhi, Shailendra Singh, Sanjay Silakari, A Survey of Cyber Attack Detection Systems ,(2009)
Uma Subramanian, Hang See Ong, Analysis of the Effect of Clustering the Training Data in Naive Bayes Classifier for Anomaly Network Intrusion Detection Journal of Advances in Computer Networks. ,vol. 2, pp. 85- 88 ,(2014) , 10.7763/JACN.2014.V2.87
Luyao Teng, Shaohua Teng, Feiyi Tang, Haibin Zhu, Wei Zhang, Dongning Liu, Lu Liang, A Collaborative and Adaptive Intrusion Detection Based on SVMs and Decision Trees international conference on data mining. pp. 898- 905 ,(2014) , 10.1109/ICDMW.2014.147