Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 7
Page No. 1493 - 1501

A Method Based on Data Mining for Detection of Intrusion in Distributed Databases

Authors : Amin Mohajer, Abbas Mirzaei Somarin, Mohammadreza Yaghoobzadeh and Sajad Jahanbakhsh Gudakahriz

References

Abdoli, F. and M. Kahani, 2009. Ontology-based distributed intrusion detection system. Proceedings of the 14th International Conference on CSI Computer (CSICC), October 2021, 2009, IEEE, New York, USA., ISBN:978-1-4244-4261-4, pp: 65-70.

Andrew, H.S. and M. Srinivas, 2003. Identifying important features for intrusion detection using support vector machines and neural networks. Proceedings of the 2003 Symposium on Applications and Internet, January 27-31, 2003, IEEE Xplore, London, pp: 209-216.

Bezerra, F. and J. Wainer, 2008. Anomaly detection algorithms in business process logs. Anomaly detection algorithms in business process logs. June 12-16, 2008, Scite Press, Barcelona, Spain, ISBN: 978-989-8111-37-1, pp: 11-18.

Bezerra, F. and J. Wainer, 2008. Anomaly detection algorithms in logs of process aware systems. Proceedings of the 2008 ACM Symposium on Applied Computing, March 16-20, 2008, ACM, Fortaleza, Brazil, ISBN:978-1-59593-753-7, pp: 951-952.

Dash, M., K. Choi, P. Scheuermann and H. Liu, 2002. Feature selection for clustering-a filter solution. Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM), December 9-12, 2002, IEEE, New York, USA., ISBN:0-7695-1754-4, pp: 115-122.

Guo, C., Y. Zhou, Y. Ping, Z. Zhang and G. Liu et al., 2014. A distance sum-based hybrid method for intrusion detection. Appl. Intell., 40: 178-188.
CrossRef  |  Direct Link  |  

Jalali, H. and A. Baraani, 2010. Genetic-based anomaly detection in logs of process aware systems. World Acad. Sci. Eng. Technol., 64: 304-309.
Direct Link  |  

Li, J., G.Y. Zhang and G.C. Gu, 2004. The research and implementation of intelligent intrusion detection system based on artificial neural network. Proceedings of the 2004 International Conference on Machine Learning and Cybernetics, August 26-29, 2004, IEEE, New York, USA., ISBN:0-7803-8403-2, pp: 3178-3182.

Lopez, V., A. Fernandez, S. Garcia, V. Palade and F. Herrera, 2013. An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics. Inf. Sci., 250: 113-141.

Mitrokotsa, A. and C. Dimitrakakis, 2013. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection. Ad Hoc Networks, 11: 226-237.

Noy, N.F. and D.L. McGuinness, 2000. Ontology development 101: A guide to creating your first ontology. Stanford Knowledge Systems Laboratory. http://www-ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinness-abstract.html

Peng, T., C. Leckie and K. Ramamohanarao, 2007. Information sharing for distributed intrusion detection systems. J. Network Comput. Appl., 30: 877-899.

Sabhnani, M. and G. Serpen, 2003. Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. Proceedings of the International Conference on Machine Learning: Models, Technologies and Applications, June 2003, Las Vegas, NV., pp: 209-215.

Scarfone, K. and P. Mell, 2012. Guide to Intrusion Detection and Prevention Systems (IDPS). Special Publication 800-94, National Institute of Standards and Technology, Technology Administration, U.S. Department Commerce, Gaithersburg, MD., USA., February 2007.

Song, D., M.I. Heywood and Z.A.N. Heywood, 2005. Training genetic programming on half a million patterns: An example from anomaly detection. IEEE. Trans. Evol. Comput., 9: 225-239.
CrossRef  |  Direct Link  |  

Spafford, E.H. and D. Zamboni, 2000. Intrusion detection using autonomous agents. Comput. Networks, 34: 547-570.

Tavallaee, M., E. Bagheri, W. Lu and A.A. Ghorbani, 2009. A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2nd IEEE Symposium on Computational Intelligence for Security and Defence Applications, July 8-10 2009, Ottawa, Canada -.

Toosi, N.A., M. Kahani and R. Monsefi, 2006. Network intrusion detection based on neuro-fuzzy classification. Proceedings of the International Conference on Computing and Informatics, June 6-8, 2006, Kuala Lumpur, pp: 1-5.

Tsai, C.F., J.H. Tsai and J.S. Chou, 2012. Centroid-based nearest neighbor feature representation for e-government intrusion detection. Proceedings of the Conference on World Telecommunications Congress (WTC), March 5-6, 2012, IEEE, Miyazaki, Japan, ISBN:978-1-4577-1459-7, pp: 1-6.

Xu, X. and X. Wang, 2005. An adaptive network intrusion detection method based on PCA and support vector machines. Proceedings of the International Conference on Advanced Data Mining and Applications, July 22-24, 2005, Springer, Berlin, Germany, ISBN:978-3-540-27894-8, pp: 696-703.

Yen, J.Y., 1971. Finding the k shortest loopless paths in a network. Manage. Sci., 17: 712-716.
Direct Link  |  

Yeung, D.Y. and C. Chow, 2002. Parzen-window network intrusion detectors. Proceedings of the 16th International Conference on Pattern Recognition, August 11-15, 2002, IEEE, New York, USA., ISBN:0-7695-1695-X, pp: 385-388.

Zhang, C., J. Jiang and M. Kamel, 2005. Intrusion detection using hierarchical neural networks. Pattern Recognit. Lett., 26: 779-791.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved