Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods*

作者: Dan Zhu , G. Premkumar , Xiaoning Zhang , Chao-Hsien Chu

DOI: 10.1111/J.1540-5915.2001.TB00975.X

关键词:

摘要: … Chao-Hsien Chu is an associate professor of information sciences and technology at Pennsylvania State University, University Park and is also the Chief Academic Advisor to the …

参考文章(53)
Dan Zhu, Rema Padman, Connectionist approaches for solver selection in constrained project scheduling Annals of Operations Research. ,vol. 72, pp. 265- 298 ,(1997) , 10.1023/A:1018952406004
PJ Bentley, J Kim, Negative selection and niching by an artificial immune system for network intrusion detection genetic and evolutionary computation conference. ,(1999)
Alfonso Valdes, Phillip A. Porras, Live Traffic Analysis of TCP/IP Gateways. network and distributed system security symposium. ,(1998)
H. Michael Chung, Paul Gray, Special section: data mining Journal of Management Information Systems. ,vol. 16, pp. 11- 16 ,(1999) , 10.1080/07421222.1999.11518231
William E. Spangler, Jerrold H. May, Luis G. Vargas, Choosing data-mining methods for multiple classification: representational and performance measurement implications for decision support Journal of Management Information Systems. ,vol. 16, pp. 37- 62 ,(1999) , 10.1080/07421222.1999.11518233
Eugene H. Spafford, Daniel Farmer, The COPS Security Checker System USENIX Summer. pp. 165- 170 ,(1990)
Phil Porras, STAT -- A State Transition Analysis Tool For Intrusion Detection University of California at Santa Barbara. ,(1993)
Ioannis Kapouleas, Sholom M. Weiss, An empirical comparison of pattern recognition, neural nets, and machine learning classification methods international joint conference on artificial intelligence. pp. 781- 787 ,(1989)
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496