Perfection of Intrusion Detection Using Correlation, Genetic Algorithm, Radial Basis Function
Abstract
Keywords
References
AbdRazak S., Furnell S., Clarke N., and Brooke P., “A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach,” in Proceedings of Lecture Notes in Computer Science, Berlin, pp. 590-595 (2006).
Almgren M., Lindqvist U., and Jonsson E. “A Multi-Sensor Model to Improve Automated Attack Detection,” in Proceedings of Lecture Notes in Computer Science , Berlin, pp. 291-310 (2008).
Carver C., Humphries J., and Pooch U., “Adaptation Techniques for Intrusion Detection and Intrusion Response Systems,” in Proceedings of IEEE International Conference on Systems Man and Cybernetics, USA, pp. 2344-2349.(2000).
CHATZIGIANNAKIS, V., ANDROULIDAKIS, G., PELECHRINIS, K., PAPAVASSILIOU, S., MAGLARIS, V. Data fusion algorithms for network anomaly detection: classification and evaluation. Proceedings of the Third International Conference on Networking and Services, 50 – 51 (2007).
CHEN, Q., AICKELIN, U. Dempster-Shafer for Anomaly Detection. In Proceedings of the International Conference on Data Mining (DMIN 2006), Las Vegas, USA, 232-238(2006).
CHOU, T. , Ensemble fuzzy belief intrusion detection design. PhD thesis, Florida international university, Florida, USA, (2007).
HU, W., LI, J., GAO, Q. Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence. Communications, Circuits and Systems Proceedings, 2006 International Conference, 3, 1627-1631 (2006).
J. McHugh,Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection, ACM Transactions on Information and System Security (TISSEC) 3 (4) 262–294 (2000).
KATAR, C., Combining multiple techniques for intrusion detection. IJCSNS International Journal of Computer Science and Network Security, 6(2B), 125-129 (2006).
KDD99 archive: The Fifth International Conference on Knowledge Discovery and Data Mining. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
Laleh N. and Azgomi M., “A Taxonomy of Frauds and Fraud Detection Techniques,” in Proceeding of Communications in Computer and Information Science, Berlin, pp. 256-267,(2009).
M. Mahoney, P.K. Chan, An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. Recent advances in intrusion detection: 6th international symposium, RAID 220–237, doi:10.1007/b13476 (2003).
Mosqueira-Rey E., Alonso-Betanzos A., Rio B., and Pineiro J., “A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture,” in Proceedings of the 1 st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications Berlin, pp. 466-475, (2007).
Haviluddin, R. Alfred, J. H. Obit, M. H. A. Hijazi, and A. A. A. Ibrahim, "A Performance Comparison of Statistical and Machine Learning Techniques in Learning Time Series Data," Advanced Science Letters, pp. 3037-3041, 2015.
Rehak M., Pechoucek M., Bartos K., Grill M., Celeda P., and Krmick V., “An Intrusion Detection System for High-Speed Networks,” in Proceedings of National Institute of Informatics, Berlin, pp. 65-74,(2008).
SPSS 11.0 © SPSS] Inc, www.spss.com
WEKA software, Machine Learning, http://www.cs.waikato.ac.nz/ml/weka/, The University of Waikato, Hamilton, New Zealand.
YU, D., FRINCKE, D., Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. ACM-SE 43: Proceedings of the 43rd annual southeast regional conference. 2, 142 – 147, (2005).
Zhang Z. and Shen H, “A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection”, in Proceedings of Lecture Notes in Computer Science, Berlin, pp. 178-191.(2005).
DOI: http://dx.doi.org/10.19732/10.19732/vol1122016
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 International Journal of Computing and Informatics (IJCANDI)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
International Journal of Computing and Informatics (eISSN: 2502-2334)
Organized by Universitas Mulawarman, Universiti Malaysia Sabah, Universitas Muslim Indonesia
Published by Universitas Mulawarman
W : http://ijcandi.org
E : ijcandi@unmul.ac.id or haviluddin.ijcandi@gmail.com

IJCANDI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats