4.7 Article

Network Anomaly Detection: Methods, Systems and Tools

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Hybrid intelligent systems for detecting network intrusions

Mrutyunjaya Panda et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Theory & Methods

RT-MOVICAB-IDS: Addressing real-time intrusion detection

Alvaro Herrero et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Information Systems

Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge

Pedro Casas et al.

COMPUTER COMMUNICATIONS (2012)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Artificial Intelligence

A differentiated one-class classification method with applications to intrusion detection

Inho Kang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Artificial Intelligence

Adaptive ROC-based ensembles of HMMs applied to anomaly detection

Wael Khreich et al.

PATTERN RECOGNITION (2012)

Article Computer Science, Artificial Intelligence

Artificial immune system based on interval type-2 fuzzy set paradigm

A. Viscontia et al.

APPLIED SOFT COMPUTING (2011)

Article Computer Science, Hardware & Architecture

A Survey of Outlier Detection Methods in Network Anomaly Identification

Prasanta Gogoi et al.

COMPUTER JOURNAL (2011)

Article Computer Science, Hardware & Architecture

Surveying Port Scans and Their Detection Methodologies

Monowar H. Bhuyan et al.

COMPUTER JOURNAL (2011)

Article Computer Science, Information Systems

HMMPayl: An intrusion detection system based on Hidden Markov Models

Davide Ariu et al.

COMPUTERS & SECURITY (2011)

Article Computer Science, Hardware & Architecture

Anomaly Detection in Network Traffic Based on Statistical Inference and α-Stable Modeling

Federico Simmross-Wattenberg et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)

Article Computer Science, Artificial Intelligence

An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming

Shingo Mabu et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2011)

Article Computer Science, Hardware & Architecture

Mutual information-based feature selection for intrusion detection systems

Fatemeh Amiri et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Artificial Intelligence

Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies

Xin Xu

APPLIED SOFT COMPUTING (2010)

Review Computer Science, Artificial Intelligence

The use of computational intelligence in intrusion detection systems: A review

Shelly Xiaonan Wu et al.

APPLIED SOFT COMPUTING (2010)

Review Computer Science, Artificial Intelligence

Ensemble-based classifiers

Lior Rokach

ARTIFICIAL INTELLIGENCE REVIEW (2010)

Article Computer Science, Artificial Intelligence

An ensemble-based evolutionary framework for coping with distributed intrusion detection

Gianluigi Folino et al.

GENETIC PROGRAMMING AND EVOLVABLE MACHINES (2010)

Article Computer Science, Information Systems

An Overview of IP Flow-Based Intrusion Detection

Anna Sperotto et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)

Article Computer Science, Information Systems

A Survey on Network Coordinates Systems, Design, and Security

Benoit Donnet et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)

Article Computer Science, Artificial Intelligence

Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods

Mahbod Tavallaee et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2010)

Article Computer Science, Software Engineering

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

Asaf Shabtai et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2010)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Artificial Intelligence

Intrusion detection using fuzzy association rules

Arman Tajbakhsh et al.

APPLIED SOFT COMPUTING (2009)

Article Computer Science, Hardware & Architecture

McPAD: A multiple classifier system for accurate payload-based anomaly detection

Roberto Perdisci et al.

COMPUTER NETWORKS (2009)

Article Computer Science, Interdisciplinary Applications

A research using hybrid RBF/Elman neural networks for intrusion detection system secure model

Xiaojun Tong et al.

COMPUTER PHYSICS COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

A hybrid intrusion detection system design for computer network security

M. Ali Aydin et al.

COMPUTERS & ELECTRICAL ENGINEERING (2009)

Article Computer Science, Information Systems

A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach

Ming-Yang Su et al.

COMPUTERS & SECURITY (2009)

Article Computer Science, Information Systems

Building lightweight intrusion detection system using wrapper-based feature selection mechanisms

Yang Li et al.

COMPUTERS & SECURITY (2009)

Article Computer Science, Information Systems

Anomaly-based network intrusion detection: Techniques, systems and challenges

P. Garcia-Teodoro et al.

COMPUTERS & SECURITY (2009)

Review Computer Science, Artificial Intelligence

Intrusion detection by machine learning: A review

Chih-Fong Tsai et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)

Article Computer Science, Information Systems

A Comparative Analysis of Network Dependability, Fault-tolerance, Reliability, Security, and Survivability

M. Al-Kuwaiti et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)

Article Computer Science, Information Systems

A Survey on Internet Traffic Identification

Arthur Callado et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)

Article Engineering, Electrical & Electronic

Network Anomaly Detection Based on Wavelet Analysis

Wei Lu et al.

EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING (2009)

Article Computer Science, Hardware & Architecture

A user-oriented ontology-based approach for network intrusion detection

Shao-Shin Hung et al.

COMPUTER STANDARDS & INTERFACES (2008)

Article Computer Science, Information Systems

A Survey of Techniques for Internet Traffic Classification using Machine Learning

Thuy T. T. Nguyen et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)

Article Computer Science, Theory & Methods

Data fusion and cost minimization for intrusion detection

Devi Parikh et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Computer Science, Artificial Intelligence

Random-forests-based network intrusion detection systems

Jiong Zhang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2008)

Article Computer Science, Artificial Intelligence

Intrusion detection in computer networks by a modular ensemble of one-class classifiers

Giorgio Giacinto et al.

INFORMATION FUSION (2008)

Article Engineering, Electrical & Electronic

Detection of fraudulent usage in wireless networks

Bo Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)

Article Computer Science, Hardware & Architecture

Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks

Bo Sun et al.

IEEE WIRELESS COMMUNICATIONS (2007)

Article Computer Science, Hardware & Architecture

A new intrusion detection system using support vector machines and hierarchical clustering

Latifur Khan et al.

VLDB JOURNAL (2007)

Article Computer Science, Hardware & Architecture

An overview of anomaly detection techniques: Existing solutions and latest technological trends

Animesh Patcha et al.

COMPUTER NETWORKS (2007)

Article Engineering, Electrical & Electronic

Integration of mobility and intrusion detection for wireless ad hoc networks

Bo Sun et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2007)

Article Computer Science, Artificial Intelligence

Conditional anomaly detection

Xiuyao Song et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)

Article Computer Science, Theory & Methods

Survey of network-based defense mechanisms countering the DoS and DDoS problems

Tao Peng et al.

ACM COMPUTING SURVEYS (2007)

Article Computer Science, Artificial Intelligence

K-Means+ID3: A novel method for supervised anomaly detection by cascading k-Means clustering and ID3 decision tree learning methods

Shekhar R. Gaddam et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)

Article Computer Science, Artificial Intelligence

A hierarchical intrusion detection model based on the PCA neural networks

Guisong Liu et al.

NEUROCOMPUTING (2007)

Article Computer Science, Hardware & Architecture

Modeling intrusion detection system using hybrid intelligent systems

Sandhya Peddabachigari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2007)

Article Computer Science, Information Systems

RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks

Morteza Amini et al.

COMPUTERS & SECURITY (2006)

Article Engineering, Electrical & Electronic

Enhancing security using mobility-based anomaly detection in cellular mobile networks

Bo Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2006)

Article Computer Science, Artificial Intelligence

Fast distributed outlier detection in mixed-attribute data sets

ME Otey et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2006)

Article Computer Science, Artificial Intelligence

A clustering-based method for unsupervised intrusion detections

SY Jiang et al.

PATTERN RECOGNITION LETTERS (2006)

Article Computer Science, Artificial Intelligence

Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy

HC Peng et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2005)

Article Computer Science, Information Systems

Feature deduction and ensemble design of intrusion detection systems

S Chebrolu et al.

COMPUTERS & SECURITY (2005)

Article Computer Science, Artificial Intelligence

A survey of outlier detection methodologies

VJ Hodge et al.

ARTIFICIAL INTELLIGENCE REVIEW (2004)

Article Computer Science, Artificial Intelligence

A rough set theory based method for anomaly intrusion detection in computer network systems

ZM Cai et al.

EXPERT SYSTEMS (2003)

Article Engineering, Electrical & Electronic

Anomaly detection in IP networks

M Thottan et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2003)

Article Computer Science, Artificial Intelligence

Fusion of multiple classifiers for intrusion detection in computer networks

G Giacinto et al.

PATTERN RECOGNITION LETTERS (2003)

Article Engineering, Electrical & Electronic

Network intrusion and fault detection: A statistical anomaly approach

C Manikopoulos et al.

IEEE COMMUNICATIONS MAGAZINE (2002)

Article Computer Science, Information Systems

Intrusion detection through learning behavior model

B Balajinath et al.

COMPUTER COMMUNICATIONS (2001)

Article Computer Science, Artificial Intelligence

Estimating the support of a high-dimensional distribution

B Schölkopf et al.

NEURAL COMPUTATION (2001)

Article Computer Science, Cybernetics

Training a neural-network based intrusion detector to recognize novel attacks

SC Lee et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2001)

Article Computer Science, Artificial Intelligence

Robust classification for imprecise environments

F Provost et al.

MACHINE LEARNING (2001)

Article Computer Science, Artificial Intelligence

Adaptive intrusion detection: A data mining approach

WK Lee et al.

ARTIFICIAL INTELLIGENCE REVIEW (2000)