A Computational Intelligence for Performance Evaluation of Honeypots
Abstract
Keywords
Full Text:
PDFReferences
Know Your Enemy: Honeypots. The Honeypot project‟s Know Your Enemy Series 2005.
Curran.K., et al., “Monitoring hacker activity with a Honeypot”, International Journal of Network management, 2005. 15[2]: p.123-134
Holz, T., F.Ravnal, “Detecting Honeypots and other suspicious environments.”” Proceedings of the 2005 IEEEE, Workshop on Information Assurance and Security. 2005.
P. Defibaugh-Chavez, R.Veeraghattam, M.Kannappa, S.Mukkamala, A.H.Sung, “Network Based Detection of Virtual Environments and Low Interaction Honeypots,” Proceedings of the 2006 IEEE SMC, Workshop on Information Assurance.
C.W.Hsu, C.J.Lin,” A comparison on methods for multi class support vectot machines,” IEEE Transactions on Neural Networks, 13 pp. 415-425,2002.
C.H.Chan, I.King,” Using Biased Support vector Machine to Improve Retrieval Result in Image Retrieval with Self-organizing Map,”Proceedings of 11th International Conference, ICONIP. Lecture notes in computer Science 3316 Springer. ISBN 3-540-23931-6, pp. 714-719, 2004.
J.H. Lee, C.J. Lin, “Automatic model selection for support vector machines,” Technical report, Department of computer science and Information Engineering, National Taiwan University 2000.
O.Chapelle, V.Vapnik, “Model selection for support vector machines,” Advances in Neural Information Processing Systems 12, 1999.
V.Cherkassy, “ Model Complexity control and statistical learning theory “ Journal of natural Computing 1 pp.109-133,2002.
N.Cristianini,J.S.Taylor,” Support Vector Machines and other Kernel based Learning Algorithms,” Technical Report. Cambridge University Press.2000.
C.C.Chang, C.J.Lin,” LIBSVM: a library for support vector machines,” Technical Report, Department of Computer Science and Information Engineering, National Taiwan University, 2001.
J.P.Egan,”Signal detection theory and ROC analysis,” New York” Academic Press, 1975.
S. Mukkamala, A. H. Sung, and A. Abraham, “Computational Intelligent Techniques for Detecting Denial of Service Attacks”, Proc. of Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE), Lecture Notes in Computer Science 3029 Springer, ISBN 3-540-22007-0, pp. 633-642, 2004
Refbacks
- There are currently no refbacks.