Design Principle of IIDPS
Abstract
Keywords: Computer Antivirus Researcher's Organization, Intelligence Intrusion Detection Prevention System, Common Malware Enumeration Initiative, European Institute for Computer Anti-viral Research,
Full Text:
PDFReferences
Chebrolu S, Abraham A, Thomas J.P. Feature Detection and Ensemble Design of Intrusion Detection Systems. Compute Security: Elsevier. 2005: 24; 295–307p.
Chen Y, Abraham A, Yang J. Feature Deduction And Intrusion Detection Using Flexible Neural Trees. In Second IEEE International Symposium on Neural Networks: 2005.
Chen Z., Gao L, Kwiat K. Modeling the Spread of Active Worms”, INFOCOM. Twenty-Second Annual Joint Conferences of the IEEE Computer and Communications Societies. IEEE. 2003.
Chou T.S., Yen K.K. Fuzzy Belief K-Nearest Neighbors Anomaly Detection of User to Root and Remote to Local Attacks. The IEEE Workshop on Information Assurance. 2007: United States Military Academy, West Point, New York; 207–13p.
Cohen F. Computer Viruses: Theory and Experiments. Computer Security: Elsevier. 1987: 6(1); 22–35p.
Ghosh A.K., Schwartzbard A. A Study in Using Neural Networks for Anomaly and Misuse Detection. 8th Usenix Security Symposium. Washington D.C. 1999 August 23-36; 141–152p.
Ghosh A.K., Schwartzbard A., Schatz M. Learning Program Behavior Profiles for Intrusion Detection. Workshop on Intrusion Detection and Network Monitoring USENIX. Santa Clara C.A.1999.
Livadas C., Walsh B., Lapsley D. et al. Using Machine Learning Techniques to Identify Botnet Traffic. Second IEEE LCN Workshop on Network Security (WNS), Tampa, FL, USA.2006.
Meystel A.M., Albus J.M. Intelligent Systems Architecture, Design and Control. John Wiley & Sons, Inc. New York.2002.
Mukkamala S., Janoski G., Sung A. Monitoring System Security Using Neural Networks and Support Vector Machines. International Workshop on Hybrid Intelligent Systems. 2001: 121–138p.
Mukkamala S., Sung A., Abraham A. Designing Intrusion Detection Systems: Architectures and Perspectives. The International Engineering Consortium (IEC) Annual Review of Communications. 2004: 57; 1229–41, p.
Mukkamala S., Sung A., Abraham A. Hybrid Multi-Agent Framework for Detection of Stealthy Probe. Appl. Soft Computing Journal. 2007: 7(3); 631–41p.
Mukkamala S., Sung A.H., Abraham A. Intrusion Detection Using Ensemble Of Soft Computing Paradigms. Third International Conference on Intelligent Systems Design and Applications Advances In Soft Computing. Springer. New York. 2003: 239–248p.
Mukkamala S., Sung A.H., Abraham A. Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, Lecture Notes in Computer Science. Springer. New York. 3029: 2004; 633–42p.
Ourston D., Matzner S., Stump W. et al. Coordinated Internet Attacks Responding To Attack Complexity. Computer Security IEEE. 2004: 12; 165–190p.
Shah K., Dave N., Chavan S. et al. Adaptive Neuro-Fuzzy Intrusion Detection System. IEEE International Conference on ITCC’04. 1: 2004; 70–74p.
Wang W., Gombault S., Guyet T. Towards Fast Detecting Intrusions: Using Key Attributes Of Network Traffic. The third international conference on internet monitoring and protection. IEEE Press. New York, 2008: 86–91p.
Wang J. Internet Worm Early Detection and Response Mechanism. The Journal of China Universities of Posts and Telecommunications, IEEE. 14(3): 2007; 79–84p.
Refbacks
- There are currently no refbacks.