共 19 条
- [1] Lee W., Stolfo S.J., Mok K.W., A data mining framework for building intrusion detection models, Proc of the 20th IEEE Symp on Security & Privacy, pp. 120-132, (1999)
- [2] Roesch M., Snort-lightweight intrusion detection for networks, Proc of the 13th USENIX Conf on System Administration, pp. 229-238, (1999)
- [3] Om H., Kundu A., A hybrid system for reducing the false alarm rate of anomaly intrusion detection system, Proc of the 1st Int Conf on Recent Advances in Information Technology, pp. 131-136, (2012)
- [4] Raman M.R.G., Somu N., Kirthivasan K., Et al., An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine, Knowledge-Based Systems, 134, pp. 1-12, (2017)
- [5] Khammassi C., Krichen S., A GA-LR wrapper approach for feature selection in network intrusion detection, Computers & Security, 70, pp. 255-277, (2017)
- [6] Aljawarneh S., Aldwairi M., Yassein M.B., Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model, Journal of Computational Science, 25, pp. 152-160, (2018)
- [7] George A., Anomaly detection based on machine learning dimensionality reduction using PCA and classification using SVM, International Journal of Computer Applications, 47, 21, pp. 5-8, (2012)
- [8] Hashem S.H., Efficiency of SVM and PCA to enhance intrusion detection system, Journal of Asian Scientific Research, 3, 4, pp. 381-395, (2013)
- [9] Cheng X., Yu H., Li Z., Improved K-means network intrusion detection algorithm, Intelligent Computer & Applications, 2, 2, pp. 21-23, (2012)
- [10] Alyaseen W.L., Othman Z.A., Nazri M.Z.A., Hybrid modified K-means with C4.5 for intrusion detection systems in multiagent systems, The Scientific World Journal, 2015, 2, (2015)