Asian Journal of Information Technology

Year: 2012
Volume: 11
Issue: 5
Page No. 153 - 159

Network Intrusion Prediction Using Associative Classification Method

Authors : Mohd Zakree Ahmad Nazri, Nor Emizan Abdul Majid, Azuraliza Abu Bakar and Hafiz Mohd Sarim

References

Adetunmbi, A.O., S.O. Falaki, O.S. Adewale and B.K. Alese, 2008. Network intrusion detection based on rough set and k-nearest neighbour. Int. J. Comput. ICT Res., 2: 60-66.
Direct Link  |  

Agrawal, R. and R. Srikant, 1994. Fast algorithms for mining association rules in large databases. Proceedings of the 20th International Conference on Very Large Data Bases, September 12-15, 1994, San Francisco, USA., pp: 487-499.

Allen, J., A. Christie, W. Fithen, J. McHugh, J. Pickel and E. Stoner, 2000. State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028 ESC-99-028, Carnegie Mellon University. http://www.sei.cmu.edu/reports/99tr028.pdf.

Bace, R.G., 2000. Intrusion Detection. Sams Publishing, USA., ISBN: 1578701856, Pages: 339.

Bahrololum, M. and M. Khaleghi, 2008. Anomaly intrusion detection system using Hierarchical Gaussian mixture model. Int. J. Comput. Sci. Network Secur., 8: 264-271.
Direct Link  |  

Betanzos, A.A., S.N. Marono, F.M.C. Fortes, J.A.S. Romero and B.P. Sanchez, 2007. Classification of computer intrusions using functional networks: A comparative study. Proceedings of the 15th European Symposium on Artificial Neural Networkss, April 25-27, 2007, Bruges, Belgium -.

Borgelt, C., 2003. Apriori: Finding association rules/hyperedges with the apriori algorithm. http://www.kdkeys.net/apriori-finding-association-ruleshyperedges-with-the-apriori-algorithm/.

Chebrolu, S., A. Abraham and J.P. Thomas, 2005. Feature deduction and ensemble design of intrusion detection systems. Comput. Secur., 24: 295-307.
CrossRef  |  Direct Link  |  

Ezeife, C.I., J. Dong and A.K. Aggarwal, 2007. SensorWebIDS: A web mining intrusion detection. Int. J. Web Inf. Syst., 4: 97-120.

Lippmann, R.P., D.J. Fried, I. Graf, J.W. Haines and K.R. Kendall et al., 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), January 25-27, 2000, IEEE Computer Society Press, Los Alamitos, CA, pp: 12-26.

Mounji, A., 1997. Languages and tools for rule-based distributed intrusion detection. Ph.D. Thesis, Facult-Es Universitaires Notre-Dame De La Paix Namur, Belgium.

Puketza, N.J., K. Zhang, M. Chung, B. Mukherjee and R.A. Olsson, 1996. A methodology for testing intrusion detection systems. IEEE Trans. Software Eng., 22: 719-729.
CrossRef  |  

Thabtah, F.A., 2007. A review of associative classification mining. Knowledge Eng. Rev., 22: 37-65.
CrossRef  |  

Treinen, J.J. and R. Thurimella, 2006. A framework for the application of association rule mining in large intrusion detection infrastructures. Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, September 20-22, 2006, Hamburg, Germany, pp: 1-18.

Tsai, F.S., 2009. Network intrusion detection using association rules. Int. J. Recent Trends Eng., 2: 202-204.
Direct Link  |  

Wang, H., G. Zhang, H. Chen and X. Jiang, 2009. Mining association rules for intrusion detection. Proceedings of the 4th International Conference on Frontier of Computer Science and Technology, December 17-19, 2009, Shanghai, pp: 644-648.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved