International Journal of Soft Computing

Year: 2013
Volume: 8
Issue: 6
Page No. 400 - 405

An Intrusion Detection System for MANET using CRF Based Feature Selection and Temporal Association Rules

Authors : R.M. Somasundaram and K. Lakshmanan

References

Alcala-Fdez, J., R. Alcala and F. Herrera, 2011. A fuzzy association rule-based classification model for high-dimensional problems with genetic rule selection and lateral tuning. IEEE Trans. Fuzzy Syst., 19: 857-872.
CrossRef  |  

Changguo, Y., Z. Qin, Z. Jingwei, W. Nianzhong, Z. Xiaorong and W. Tailei, 2009. Improvement of association rules mining algorithm in wireless network intrusion detection. Proceedings of the IEEE International Conference on Computational Intelligence and Natural Computing, June 6-7, 2009, Wuhan, China, pp: 413-416.

Gupta, K.K., B. Nath and R. Kotagiri, 2010. Layered approach using conditional random fields for intrusion detection. IEEE Trans. Dependable Secure Comput., 7: 35-49.
CrossRef  |  

Han, S.J. and S.B. Cho, 2006. Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans. Syst. Man Cybern. Part B: Cybern., 36: 559-570.
CrossRef  |  PubMed  |  

Hu, W., W. Hu and S. Maybank, 2008. AdaBoost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B: Cybern., 38: 577-583.
CrossRef  |  

KDD Cup, 1999. KDD cup'99: Computer network intrusion detection. http://www.kdd.org/kdd-cup-1999-computer-network-intrusion-detection.

Luo, J., 1999. Integrating fuzzy logic with data mining methods for intrusion detection. M.Sc. Thesis, Mississippi State University, Department of Computer Science.

Mabu, S., C. Chen, N. Lu, K. Shimada and K. Hirasawa, 2011. An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev., 41: 130-139.
CrossRef  |  

Morris, J. and E. Fosler-Lussier, 2008. Conditional random fields for integrating local discriminative classifiers. IEEE Trans. Audio Speech Lan. Process., 16: 617-628.
CrossRef  |  

Namik, A.F. and Z.A. Othman, 2011. Reducing network intrusion detection association rules using chi-squared pruning technique. Proceedings of the IEEE 3rd Conference on Data Mining and Optimization, June 28-29, 2011, Putrajaya, Malaysia, pp: 122-127.

Shimada, K., K. Hirasawa and J. Hu, 2006. Class association rule mining with chi-squared test using genetic network programming. Proceedings of the IEEE International Conference on Systems Man and Cybernetics, October 8-11, 2006, Taipei, Taiwan, pp: 5338-5344.

Shimada, K., K. Hirasawa and J. Hu, 2006. Genetic network programming with acquisition mechanisms of association rules. J. Adv. Comput. Intell. Inform., 10: 102-111.
Direct Link  |  

Stewart, L., X. He and R.S. Zemel, 2008. Learning flexible features for conditional random fields. IEEE Trans. Pattern Anal. Mach. Intell., 30: 1415-1426.
CrossRef  |  

Su, M.Y., C.Y. Lin, S.W. Chien and H.C. Hsu, 2011. Genetic-fuzzy association rules for network intrusion detection systems. Proceedings of the IEEE International Conference on Fuzzy Systems, June 27-30, 2011, Taipei, Taiwan, pp: 2046-2052.

Wu, K., J. Hao and C. Wang, 2010. Intrusion detection based on fuzzy association rules. Proceedings of the International Symposium on Intelligence Information Processing and Trusted Computing, October 28-29, 2010, Huanggang, China, pp: 200-203.

Yu, Z., J.J.P. Tsai and T. Weigert, 2006. An automatically tuning intrusion detection system. IEEE Trans. Syst. Man Cybern. Part B: Cybern., 37: 373-384.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved