References
- R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, "1999 DARPA off-line intrusion detection evaluation," Computer Networks, vol. 34, no. 4, pp. 579-595, 2000. https://doi.org/10.1016/S1389-1286(00)00139-0
- D. Anderson, T. Frivold, and A. Valdes, Next-Generation Intrusion Detection Expert System (NIDES): a summary. SRI Technical Report No.: SRI-CSL-95-07, Menlo Park, CA: SRI International Computer Science Laboratory, 1995.
- K. R. Kendall, "A database of computer attacks for the evaluation of intrusion detect systems," MS Thesis, Massachusetts Institute of Technology, Cambridge, MA, 1999.
- W. H. Chen, S. H. Hsu, and H. P. Shen, "Application of SVM and ANN for intrusion detection," Computers and Operations Research, vol. 32, no. 10, pp. 2617-2634, 2005. https://doi.org/10.1016/j.cor.2004.03.019
- T. Horeis, "Intrusion detection with neural networks combination of self-organizing maps and radial basis function networks for human expert integration," http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.106.191&rep=rep1&type=pdf.
- H. Gunes Kayacik, A. Nur Zincir-Heywood, and M. I. Heywood, "A hierarchical SOM-based intrusion detection system," Engineering Applications of Artificial Intelligence, vol. 20, no. 4, pp. 439-451, 2007. https://doi.org/10.1016/j.engappai.2006.09.005
- G. Liu, Z. Yi, and S. Yang, "A hierarchical intrusion detection model based on the PCA neural networks," Neurocomputing, vol. 70, no. 7-9, pp. 1561-1568, 2007. https://doi.org/10.1016/j.neucom.2006.10.146
- R. Beghdad, "Critical study of neural networks in detecting intrusions," Computers and Security, vol. 27, no. 5-6, pp. 168- 175, 2008. https://doi.org/10.1016/j.cose.2008.06.001
- K. Shafi and H. A. Abbass, "An adaptive genetic-based signature learning system for intrusion detection," Expert Systems with Applications, vol. 36, no. 10, pp. 12036-12043, 2009. https://doi.org/10.1016/j.eswa.2009.03.036
- E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data," Applications of Data Mining in Computer Security. Advances in Information Security Vol. 6, D. Barbara and S. Jajodia, Eds., Boston, MA: Kluwer Academic Publishers, 2002, pp. 77-101.
- M. S. Mok, S. Y. Sohn, and Y. H. Ju, "Random effects logistic regression model for anomaly detection," Expert Systems with Applications, vol. 37, no. 10, pp. 7162-7166, 2010. https://doi.org/10.1016/j.eswa.2010.04.017
- G. Wang, J. Hao, J. Mab, and L. Huang, "A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering," Expert Systems with Applications, vol. 37, no. 9, pp. 6225-6232, 2010. https://doi.org/10.1016/j.eswa.2010.02.102
- A. H. Fares, M. I. Sharrawy, and H. H. Zayed, "A fast intrusion detection technique based on machine learning," Proceedings of the 35th International Conference for Statistics and Computer Science and Its Applications, Cairo, Egypt, April 11-22, 2010.
- S. S. Haykin, Neural Networks: A Comprehensive Foundation, 2nd ed., Upper Saddle River, NJ: Prentice Hall, 1999.
- K. Mehrotra, C. K. Mohan, and S. Ranka, Elements of Artificial Neural Networks, Cambridge, MA: MIT Press, 1997.
- Information Systems Technology Group, "The 1998 intrusion detection off-line evaluation plan information," http://www.ll.mit.edu/ mission/communications/ist/corpora/ideval/index.html.
- The KDD cup 1999 data set, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html.
- S. Hettich, S. D. Bay, "The UCI KDD archive," http://kdd.ics.uci.edu.
- KDD data set task and features categories details, http://kdd.ics.uci.edu/ databases/kddcup99/task.html.
- K. M. Faraoun and A. Boukelif, "Neural networks learning improvement using the K-means clustering algorithm to detect network," International Journal of Computational Inteligence, vol. 3, no. 2, pp. 161-168, 2006.
Cited by
- A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models vol.11, pp.4, 2015, https://doi.org/10.17662/ksdim.2015.11.4.033
- The prediction of action positions in team handball by non-linear hybrid neural networks vol.17, pp.3, 2017, https://doi.org/10.1080/24748668.2017.1336688
- A Comparative Study on the Performance of SVM and an Artificial Neural Network in Intrusion Detection vol.17, pp.2, 2016, https://doi.org/10.5762/KAIS.2016.17.2.703
- A Survey on Intrusion-Tolerant System vol.7, pp.4, 2013, https://doi.org/10.5626/JCSE.2013.7.4.242