References
- 이장현, 김성옥, "신경회로망을 이용한 비정상적인 패킷탐지", 정보보호학회 논문지, 제 11권, 제 5호, pp. 105-117, 2001.
- Steven Noel, Duminda Wijesekera, and Charles Youman, "Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt," in Applications of Data Mining in Computer Security, Kluwer Academic Publisher, pp. 1-31, 2002.
- 이한성, 임영희, 박주영, 박대희, "SVM과 클러스터링 기반 적응형 침입탐지 시스템", 퍼지 및 지능시스템학회 논문지, Vol. 13, No. 2, pp. 237-242, 2003 https://doi.org/10.5391/JKIIS.2003.13.2.237
- WunHwa Chen, ShengHsun Hsu, and H. P. HwangPin Shen, "Application of SVM and ANN for intrusion detection", Computers & Operations Research, ELSEVIER, Vol. 32, Issue 10, pp. 2617-2634, 2005 https://doi.org/10.1016/j.cor.2004.03.019
- KunLun Li, HouKuan Huang, ShengFeng Tian, and Wei Xu, "Improving one-class SVM for anomaly detection", International Conference on Machine Learning and Cybernetics, Vol. 5, pp. 3077-3081, 2003
- Ambwani, T., "Multi class support vector machine implementation to intrusion detection", Proceedings of the International Joint Conference on Neural Networks, Vol. 3, pp. 2300-2305, 2003
- C.W. Hsu and C.J. Lin., "A comparison of methods for multi-class support vector machines", IEEE Transactions on Neural Networks, Vol. 13, pp. 415-425, 2002 https://doi.org/10.1109/72.991427
- 박주영, 임채환, "비정상 상태 탐지 문제를 위한 서포트벡터 학습", 퍼지 및 지능시스템학회 논문지, Vol. 13, No. 3, pp. 266-274, 2003 https://doi.org/10.5391/JKIIS.2003.13.3.266
- David M.J. Tax and Robert P.W. Duin, "Uniform Object Generation for Optimizing One-class Classifiers", Journal of Machine Learning Research, Vol. 2, Issue 2, pp. 155-173, 2001 https://doi.org/10.1162/15324430260185583
- KDD CUP 1999 DATA, Available in http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html and http://www-cse.ucsd.edu/users/elkan/kdresults.html
- Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy and Salvatore Stolfo. "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", in Applications of Data Mining in Computer Security, Kluwer Academic Publisher, pp. 77-101, 2002
- Results of the KDD '99 Classifier Learning Contest, Available in http://www-cse.ucsd.edu/users/elkan/clresults.html
- Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok, "A data mining framework for building intrusion detection models", Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
- Liu, Y., Chen, K., Liao, X., and Zhang, W., "A Genetic Clustering Method for Intrusion Detection", Pattern Recognition, Vol. 37, Issue 5, pp. 927-942. 2004. https://doi.org/10.1016/j.patcog.2003.09.011
- Kayacik, H.G., Zincir-Heywood, A.N., and Heywood, M.I., "On the capability of an SOM based intrusion detection system", Proceedings of the International Joint Conference on Neural Networks, Vol. 3, pp. 1808-1813, 2003.
Cited by
- Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids vol.2, pp.4, 2011, https://doi.org/10.1109/TSG.2011.2159818
- Intruder Detection System Based on Pyroelectric Infrared Sensor vol.26, pp.5, 2016, https://doi.org/10.5391/JKIIS.2016.26.5.361