skip to main content
10.1145/312129.312212acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article
Free Access

Mining in a data-flow environment: experience in network intrusion detection

Published:01 August 1999Publication History
First page image

References

  1. AIS93.R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the A CM SIGMOD Conference on Management of Data, pages 207-216, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Coh95.W.W. Cohen. Fast effective rule induction. In Machine Learning: the 12th International Conference, Lake Taho, CA, 1995. Morgan Kaufmann.Google ScholarGoogle Scholar
  3. CS93.P.K. Chan and S. J. Stolfo. Toward parallel and distributed learning by meta-learning. In AAAI Workshop in Knowledge Discovery in Databases, pages 227-240, 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. FP97.T. Fawcett and F. Provost. Adaptive fraud detection. Data Mining and Knowledge Discovery, 1:291-316, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. FPSS96.U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth. The KDD process of extracting useful knowledge from volumes of data. Communications of the A CM, 39(11):27-34, November 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. JH94.N. Japkowicz and H. Hirsh. Towards a bootstrapping approach to constructive induction. in Working Notes of the Workshop on Constructive Induction and Change of Representation, 1994.Google ScholarGoogle Scholar
  7. JLM89.V. Jacobson, C. Leres, and S. McCanne. tcpdump, available via anonymous ftp to ftp.ee.lbl.gov, June 1989.Google ScholarGoogle Scholar
  8. LSM98.W. Lee, S. J. Stolfo, and K. W. Mok. Mining audit data to build intrusion detection models. In Proceedings of the j th International Conference on Knowledge Discovery and Data Mining, New York, NY, August 1998. AAAI Press.Google ScholarGoogle Scholar
  9. LSM99.W. Lee, S. J. Stolfo, and K. W. Mok. A data mining framework for building intrusion detection models, in Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999.Google ScholarGoogle Scholar
  10. MTV95.H. Mannila, H. Toivonen, and A. i. Verkamo. Discovering frequent episodes in sequences. In Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining, Montreal, Canada, August 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. NFR.Network Flight Recorder Inc. Network flight recorder, http://www.nfr.com, 1997.Google ScholarGoogle Scholar
  12. Tur95.P.D. Turney. Cost-sensitive classification: Empirical evaluation of a hybrid genetic decision tree induction algorithm. Journal of Artificial Intelligence Research, 2(1995):369- 409, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mining in a data-flow environment: experience in network intrusion detection

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  KDD '99: Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
                  August 1999
                  439 pages
                  ISBN:1581131437
                  DOI:10.1145/312129

                  Copyright © 1999 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 August 1999

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate1,133of8,635submissions,13%

                  Upcoming Conference

                  KDD '24

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader