최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. The KIPS transactions. Part C Part C, v.11C no.3, 2004년, pp.301 - 308
원일용 (건국대학교 대학원 컴퓨터공학과) , 송두헌 (용인송담대학 컴퓨터소프트웨어) , 이창훈 (건국대학교 컴퓨터공학과)
Misuse IDS is known to have an acceptable accuracy but suffers from high rates of false alarms. We show a behavior based alarm reduction with a memory-based machine learning technique. Our extended form of IBL, (XIBL) examines SNORT alarm signals if that signal is worthy sending signals to security ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
S. Patton, W. Yurcik and D. Doss, 'An Achilles Heel in Signature-Based IDS : Squealing False Positives in SNORT,' Lecture Notes in Computer Science, 2001
W. LEE, 'A Data Mining Framework for constructing Features and Models for Intrusion Detection Systems,' Ph.D. Dissertation, Columbia University, 1999
I. Weon, D. Song, C. Lee, Y. Heo and J. Jang, 'A Machine Learning approach toward an environment-free network anomaly IDS A primer report,' Proc. of 5th International Conference on Advanced Communication Technology, 2003
C. Kruegel and T. Toth, 'Using decision trees to improve signature-based detection,' In 6th Symposium on Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, Springer Verlag, USA, September, 2003
M. Mahoney and P. Chan, 'PHAD : Packet Header Anomaly Detection for Identifying Hostile Network Traffic,' Florida Institute for Technology Technical Report CS-2001-04
R. Lippman et als., 'Evaluation intrusion detection systems : The 1998 DARPA off-line intrusion detection evaluation,' Proc. of DARPA Information Survivability Conference and Exposition, pp.12-26, 2000
S. Manganaris, M. Christensen, D. Zerkle and K. Hermiz, 'A Data Mining Analysis of RTID Alarms,' 2nd Workshop on Recent Advances in Intrusion Detection (RAID99), 1999
SNORT, http://www.snort.org
D. Aha and D. Kibler, 'Noise-tolerant instance-based learning algorithms,' Proceedings of the Eleventh International Joint Conference on Artificial Intelligence, pp.794-799, 1989
McHugh, J., 'Testing Intrusion Detection Systems : A critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory,' ACM Transactions on Information and System Security, Vol.3, No.4, Nov., 2000
M. Roech, 'SNORT-lightweight Intrusion Detection in Networks,' USENIX/LISA Conference, 1999
J. R. Quinlan, 'Probabilistic Decision Trees, in Machine Learning : An Artificial Intelligence approach,' in Machine Learning III, (ed. Yves Kodratoff), Morgan Kaufmann Publishers, Inc., San Mateo, California, pp.140-152, 1990
C. Stanfill and D. Waltz, 'Toward memory-based reasoning,' Communications of the ACM, 1986
S. Cost and S. Salzberg, 'A Weighted Nearest Neighbor Algorithm for Learning with Symbolic Features,' Machine Learning 10, pp.57-78, 1993
김도진, 'IBL을 사용한 네트워크 기반 침입탐지 시스템과 평가 모델의 연구,' 건국대학교 석사학위 청구논문, 2003
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.