Survey on Intrusion Detection Techniques Using Data-Mining Domain

作者: C G Priya , P Uday Babu , R Visakh

DOI:

关键词:

摘要:

参考文章(8)
John McHugh, Testing Intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 262- 294 ,(2000) , 10.1145/382912.382923
Reda M. Elbasiony, Elsayed A. Sallam, Tarek E. Eltobely, Mahmoud M. Fahmy, A hybrid network intrusion detection framework based on random forests and weighted k-means Ain Shams Engineering Journal. ,vol. 4, pp. 753- 762 ,(2013) , 10.1016/J.ASEJ.2013.01.003
Terrence P. Fries, A fuzzy-genetic approach to network intrusion detection Proceedings of the 2008 GECCO conference companion on Genetic and evolutionary computation - GECCO '08. pp. 2141- 2146 ,(2008) , 10.1145/1388969.1389037
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers & Security. ,vol. 31, pp. 357- 374 ,(2012) , 10.1016/J.COSE.2011.12.012
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set computational intelligence and security. pp. 53- 58 ,(2009) , 10.1109/CISDA.2009.5356528
Jianhua Wang, Yan Yu, Research on Hybrid Neural Network in Intrusion Detection System World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering. ,vol. 7, pp. 481- 485 ,(2013)
Uday Babu P, , Visakh R, A Proposed Methodology for Virus Detection Using Data Mining and Reverse Engineering Tools with Client-Server Model International Journal of Computer Trends and Technology. ,vol. 8, pp. 200- 203 ,(2014) , 10.14445/22312803/IJCTT-V8P136
V. Bolón-Canedo, N. Sánchez-Maroño, A. Alonso-Betanzos, Feature selection and classification in multiple class datasets Expert Systems With Applications. ,vol. 38, pp. 5947- 5957 ,(2011) , 10.1016/J.ESWA.2010.11.028