Asian Journal of Information Technology

Year: 2011
Volume: 10
Issue: 4
Page No. 136 - 141

Design and Implementation of a Data Mining-Based Network Intrusion Detection Scheme

Authors : Rasha G. Mohammed and Awad M. Awadelkarim

References

Brugger, T., 2004. Data mining methods for network intrusion detection. Technical Report. University of California, Davis. http://bruggerink.com/~zow/GradSchool/brugger_dmnid_survey.pdf.

Dokas, P. and L. Ertoz, 2002. Data mining for network intrusion detection. Proceedings of the NFS workshop on next generation data mining. Nov. 1-3, Marriott, Inner Harbor, Baltimore, pp: 21-29.

Dokas, P., L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava and P. Tan, 2002. Data Mining for Network Intrusion Detection. Proc. NSF Workshop on Next Generation Data Mining, Baltimore, MD.

Dunham, M.H., 2003. Data Mining Introductory and Advanced Topics. Prentice Hall of India, New Delhi, India, ISBN-10: 81-7758-880-X.

Eid, M., 2004. A new mobile agent-based intrusion detection system using distributed sensors. In proceeding of FEASC.

Ertoz, L., E. Eilertson, A. Lazarevic, A. Lazarevic and P. Tan, 2004. MINDS-minnesota intrusion detection system. Technical Report at University of Minnesota, pp: 1-21. http://static.msi.umn.edu/rreports/2005/68.pdf.

Giacinto, G. and F. Roli, 2002. Intrusion detection in computer networks by multiple classifier systems. Proceedings of ICPR 2002, 16th International Conference on Pattern Recognition, Quebec City, Canada. Aug 11-15, IEEE press, pp: 390-393.

Idris, N.B. and B. Shanmugam, 2006. Novel attack detection using fuzzy logic and data mining. Security and Management, pp: 26-31. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.86.8373&rep=rep1&type=pdf.

Jiawei, H. and M. Kamber, 2001. Data Mining: Concepts and Techniques. Higher Educa-tion Press, Beijing, China, pp: 3-10.

Lee, W. and S. Stolfo, 1998. Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998, USENIX Association, Berkeley, CA., USA., pp: 79-94.

Lee, W., S.J. Stolfo and K.W. Mok, 1998. Mining audit data to build intrusion detection models. Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, August 27-31, 1998, AAAI Press, New York, pp: 1-20.

Lee, W., S.J. Stolfo and K.W. Mok, 1999. A data mining framework for building intrusion detection models. http://www.cs.earlham.edu/~aburdma/154973.html.

Peng, T. and W. Zuo, 2006. Data mining for network intrusion detection system in real time. Int. J. Comput. Sci. Network Sec., 6: 173-177.
Direct Link  |  

Prasad, G.V.S.N.R.V., Y. Dhanalakshmi, V.V. Kumar I.R. Babu, 2008. Modeling an intrusion detection system using data mining and genetic algorithms based on fuzzy logic. IJCSNS Int. J. Comput. Sci. Network Sec., 8: 319-325.
Direct Link  |  

Shanmugam, B. and N.B. Idris, 2009. Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks. Proceeding of International Conference of Soft Computing and Pattern Recognition, Dec. 4-7, IEEE, pp: 212-217.

Shyu, M.L. and V. Sainani, 2009. A Multiagent-Based Intrusion Detection System with the Support of Multi-Class Supervised Classification. In: Data Mining and Multi-Agent Integration, Cao, L. (Ed.). Springer-Verlag, USA., Australia, pp: 127-142.

Zhu, D., G. Premkumar, X. Zhang and C.H. Chu, 2001. Data mining for network intrusion detection: A comparison of alternative methods. Decis. Sci., 32: 635-660.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved