Weighted Nebulous Matching over Frequent Episode Rules using Internet Anomaly Detection
Abstract
Keywords
Full Text:
PDFReferences
D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu, “ADAM: Detecting Intrusions by Data Mining,” Proc. IEEE Workshop Information Assurance and Security, 2001.[2] D.J. Burroughs, L.F. Wilson, and G.V. Cybenko, “Analysis of Distributed Intrusion Detection
Systems Using Bayesian Methods Performance,” Proc. IEEE Int’l Computing and Comm. Conf., pp. 329-334, 2002.
K.S. Killourhy and R.A. Maxion, “Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits,” Proc.Int’l Symp. Recent Advances in Intrusion Detection (RAID ’02),pp. 54-73, Sept. 2002.
F. Tao, F. Murtagh, and M. Farid, “Weighted Association Rule Mining Using Weighted Support and Significance Framework,” Proc. Ninth ACM Int’l Conf. Knowledge Discovery and Data Mining (SIGKDD), pp. 661-666, 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.