The Application of Ensemble Classification Techniques in Network Intrusion Detection: a Review

سال انتشار: 1392
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,318

فایل این مقاله در 11 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

BPJ01_624

تاریخ نمایه سازی: 29 دی 1392

چکیده مقاله:

The application of data mining techniques in intrusion detection has attracted considerable attention from the research community. Ensemble learning can be used as an effective classification technique for intrusion detection. In an ensemble classification system, different base classifiers are combined in order to obtain a classifier with higher performance. In this paper, the most successful ensemble techniques used in the field of intrusion detection are introduced and discussed. These ensemble techniques are categorized based on the main idea of the ensemble and similarities in implementation of the models. The goal of this review is to provide insight into the benefits of current ensemble methods and how they can increase the performance of intrusion detection.

نویسندگان

Mohammad Amini

Department of Information Technology, University of Qom, Qom, Iran

Jalal Rezaeenoor

Department of Information Technology, University of Qom, Qom, Iran

Esmaeil Hadavandi

Department of Information Technology, University of Qom, Qom, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • A. Lazarevic, V. Kumar, and J. Srivastava, "Intrusion detection: A ...
  • C. A. Catania, and C. G. Garino, "Automatic network intrusion ...
  • considerations, " Computer Com munications, vol. 28, no. 12, pp. ...
  • _ National Conference on New Approaches in Computer Engineering and ...
  • _ National Conference on New Approaches in Computer Engineering and ...
  • Journal of network and computer applications, vol. 28, no. 2, ...
  • W. Lee, and D. Xiang, _ Information -theoretic measures for ...
  • L. I. Kuncheva, "Combining pattern classifiers: Methods and algorithms (kuncheva, ...
  • detection in computer networks by a modular ensemble of one-class ...
  • D. M. Tax, "One-class classification, " 2001. ...
  • G. Giacinto, F. Roli, and L. Didaci, "Fusion of multiple ...
  • classification system, " Multiple Classifier Systems, pp. ...
  • computer networks, " Pattern analysis and applications, vol. 10, no. ...
  • _ Wang, J. Hao, J. Mab et al., _ new ...
  • detection using neural based hybrid classification methods, " Computer Networks, ...
  • L. Khan, M. Awad, and B. Thuraisingham, "A new intrusion ...
  • J. Cannady, "Artificial neural networks for misuse detection." pp. 368-81. ...
  • G. Liu, Z. Yi, and S. Yang, "A hierarchical intrusion ...
  • K. Wang, and S. J. Stolfo, "Anomalous payload-based network intrusion ...
  • S. Haykin, Neural networks: A comprehensive foundation.: Prentice Hall, 1999. ...
  • J. Kittler, M. Hatef, R. P Duin et al., "On ...
  • N. C. Oza, and K. Tumer, "Classifier ensembles: Select _ ...
  • T. K. Ho, J. J. Hull, and S. N. Srihari, ...
  • N. C. Oza, and K. Tumer, "Input decimation ensembles: _ ...
  • A. Krogh, and J. Vedelsby, "Neural network ensembles, cross validation, ...
  • Neural Networks, IEEE Transactions _ vol. 8, no. 1, _ ...
  • نمایش کامل مراجع