The Application of Ensemble Classification Techniques in Network Intrusion Detection: a Review

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,350

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

BPJ01_624

تاریخ نمایه سازی: 29 دی 1392

Abstract:

The application of data mining techniques in intrusion detection has attracted considerable attention from the research community. Ensemble learning can be used as an effective classification technique for intrusion detection. In an ensemble classification system, different base classifiers are combined in order to obtain a classifier with higher performance. In this paper, the most successful ensemble techniques used in the field of intrusion detection are introduced and discussed. These ensemble techniques are categorized based on the main idea of the ensemble and similarities in implementation of the models. The goal of this review is to provide insight into the benefits of current ensemble methods and how they can increase the performance of intrusion detection.

Authors

Mohammad Amini

Department of Information Technology, University of Qom, Qom, Iran

Jalal Rezaeenoor

Department of Information Technology, University of Qom, Qom, Iran

Esmaeil Hadavandi

Department of Information Technology, University of Qom, Qom, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • A. Lazarevic, V. Kumar, and J. Srivastava, "Intrusion detection: A ...
  • C. A. Catania, and C. G. Garino, "Automatic network intrusion ...
  • considerations, " Computer Com munications, vol. 28, no. 12, pp. ...
  • _ National Conference on New Approaches in Computer Engineering and ...
  • _ National Conference on New Approaches in Computer Engineering and ...
  • Journal of network and computer applications, vol. 28, no. 2, ...
  • W. Lee, and D. Xiang, _ Information -theoretic measures for ...
  • L. I. Kuncheva, "Combining pattern classifiers: Methods and algorithms (kuncheva, ...
  • detection in computer networks by a modular ensemble of one-class ...
  • D. M. Tax, "One-class classification, " 2001. ...
  • G. Giacinto, F. Roli, and L. Didaci, "Fusion of multiple ...
  • classification system, " Multiple Classifier Systems, pp. ...
  • computer networks, " Pattern analysis and applications, vol. 10, no. ...
  • _ Wang, J. Hao, J. Mab et al., _ new ...
  • detection using neural based hybrid classification methods, " Computer Networks, ...
  • L. Khan, M. Awad, and B. Thuraisingham, "A new intrusion ...
  • J. Cannady, "Artificial neural networks for misuse detection." pp. 368-81. ...
  • G. Liu, Z. Yi, and S. Yang, "A hierarchical intrusion ...
  • K. Wang, and S. J. Stolfo, "Anomalous payload-based network intrusion ...
  • S. Haykin, Neural networks: A comprehensive foundation.: Prentice Hall, 1999. ...
  • J. Kittler, M. Hatef, R. P Duin et al., "On ...
  • N. C. Oza, and K. Tumer, "Classifier ensembles: Select _ ...
  • T. K. Ho, J. J. Hull, and S. N. Srihari, ...
  • N. C. Oza, and K. Tumer, "Input decimation ensembles: _ ...
  • A. Krogh, and J. Vedelsby, "Neural network ensembles, cross validation, ...
  • Neural Networks, IEEE Transactions _ vol. 8, no. 1, _ ...
  • نمایش کامل مراجع