- AIS93.R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the A CM SIGMOD Conference on Management of Data, pages 207-216, 1993. Google ScholarDigital Library
- Coh95.W.W. Cohen. Fast effective rule induction. In Machine Learning: the 12th International Conference, Lake Taho, CA, 1995. Morgan Kaufmann.Google Scholar
- CS93.P.K. Chan and S. J. Stolfo. Toward parallel and distributed learning by meta-learning. In AAAI Workshop in Knowledge Discovery in Databases, pages 227-240, 1993.Google ScholarDigital Library
- FP97.T. Fawcett and F. Provost. Adaptive fraud detection. Data Mining and Knowledge Discovery, 1:291-316, 1997. Google ScholarDigital Library
- FPSS96.U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth. The KDD process of extracting useful knowledge from volumes of data. Communications of the A CM, 39(11):27-34, November 1996. Google ScholarDigital Library
- JH94.N. Japkowicz and H. Hirsh. Towards a bootstrapping approach to constructive induction. in Working Notes of the Workshop on Constructive Induction and Change of Representation, 1994.Google Scholar
- JLM89.V. Jacobson, C. Leres, and S. McCanne. tcpdump, available via anonymous ftp to ftp.ee.lbl.gov, June 1989.Google Scholar
- LSM98.W. Lee, S. J. Stolfo, and K. W. Mok. Mining audit data to build intrusion detection models. In Proceedings of the j th International Conference on Knowledge Discovery and Data Mining, New York, NY, August 1998. AAAI Press.Google Scholar
- LSM99.W. Lee, S. J. Stolfo, and K. W. Mok. A data mining framework for building intrusion detection models, in Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999.Google Scholar
- MTV95.H. Mannila, H. Toivonen, and A. i. Verkamo. Discovering frequent episodes in sequences. In Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining, Montreal, Canada, August 1995. Google ScholarDigital Library
- NFR.Network Flight Recorder Inc. Network flight recorder, http://www.nfr.com, 1997.Google Scholar
- Tur95.P.D. Turney. Cost-sensitive classification: Empirical evaluation of a hybrid genetic decision tree induction algorithm. Journal of Artificial Intelligence Research, 2(1995):369- 409, 1995. Google ScholarDigital Library
Index Terms
- Mining in a data-flow environment: experience in network intrusion detection
Recommendations
Mining uncertain data
As an important data mining and knowledge discovery task, association rule mining searches for implicit, previously unknown, and potentially useful pieces of information—in the form of rules revealing associative relationships—that are embedded in the ...
An alert data mining framework for network-based intrusion detection system
WISA'05: Proceedings of the 6th international conference on Information Security ApplicationsIntrusion detection techniques have been developed to protect computer and network systems against malicious attacks. However, there are no perfect intrusion detection systems or mechanisms, because it is impossible for the intrusion detection systems ...
A hybrid data mining anomaly detection technique in ad hoc networks
Ad hoc network security mainly relies on defence mechanisms at each mobile node due to lack of infrastructure. For this reason, various intrusion detection techniques have been proposed for ad hoc networks. Developing Intrusion Detection Systems (IDS) ...
Comments