Asian Journal of Information Technology
Year:
2012
Volume:
11
Issue:
5
Page No.
153 - 159
References
Adetunmbi, A.O., S.O. Falaki, O.S. Adewale and B.K. Alese, 2008. Network intrusion detection based on rough set and k-nearest neighbour. Int. J. Comput. ICT Res., 2: 60-66.
Direct Link | Agrawal, R. and R. Srikant, 1994. Fast algorithms for mining association rules in large databases. Proceedings of the 20th International Conference on Very Large Data Bases, September 12-15, 1994, San Francisco, USA., pp: 487-499.
Allen, J., A. Christie, W. Fithen, J. McHugh, J. Pickel and E. Stoner, 2000. State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028 ESC-99-028, Carnegie Mellon University. http://www.sei.cmu.edu/reports/99tr028.pdf.
Bace, R.G., 2000. Intrusion Detection. Sams Publishing, USA., ISBN: 1578701856, Pages: 339.
Bahrololum, M. and M. Khaleghi, 2008. Anomaly intrusion detection system using Hierarchical Gaussian mixture model. Int. J. Comput. Sci. Network Secur., 8: 264-271.
Direct Link | Betanzos, A.A., S.N. Marono, F.M.C. Fortes, J.A.S. Romero and B.P. Sanchez, 2007. Classification of computer intrusions using functional networks: A comparative study. Proceedings of the 15th European Symposium on Artificial Neural Networkss, April 25-27, 2007, Bruges, Belgium -.
Borgelt, C., 2003. Apriori: Finding association rules/hyperedges with the apriori algorithm. http://www.kdkeys.net/apriori-finding-association-ruleshyperedges-with-the-apriori-algorithm/.
Chebrolu, S., A. Abraham and J.P. Thomas, 2005. Feature deduction and ensemble design of intrusion detection systems. Comput. Secur., 24: 295-307.
CrossRef | Direct Link | Ezeife, C.I., J. Dong and A.K. Aggarwal, 2007. SensorWebIDS: A web mining intrusion detection. Int. J. Web Inf. Syst., 4: 97-120.
Lippmann, R.P., D.J. Fried, I. Graf, J.W. Haines and K.R. Kendall
et al., 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), January 25-27, 2000, IEEE Computer Society Press, Los Alamitos, CA, pp: 12-26.
Mounji, A., 1997. Languages and tools for rule-based distributed intrusion detection. Ph.D. Thesis, Facult-Es Universitaires Notre-Dame De La Paix Namur, Belgium.
Puketza, N.J., K. Zhang, M. Chung, B. Mukherjee and R.A. Olsson, 1996. A methodology for testing intrusion detection systems. IEEE Trans. Software Eng., 22: 719-729.
CrossRef | Thabtah, F.A., 2007. A review of associative classification mining. Knowledge Eng. Rev., 22: 37-65.
CrossRef | Treinen, J.J. and R. Thurimella, 2006. A framework for the application of association rule mining in large intrusion detection infrastructures. Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, September 20-22, 2006, Hamburg, Germany, pp: 1-18.
Tsai, F.S., 2009. Network intrusion detection using association rules. Int. J. Recent Trends Eng., 2: 202-204.
Direct Link | Wang, H., G. Zhang, H. Chen and X. Jiang, 2009. Mining association rules for intrusion detection. Proceedings of the 4th International Conference on Frontier of Computer Science and Technology, December 17-19, 2009, Shanghai, pp: 644-648.