IEEE Transactions on Pattern Analysis and Machine Intelligence
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
Pattern Recognition Letters
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Practical Intrusion Detection Handbook
Practical Intrusion Detection Handbook
Combining Artificial Neural Nets: Ensemble and Modular Multi-Net Systems
Combining Artificial Neural Nets: Ensemble and Modular Multi-Net Systems
Intrusion Signatures and Analysis
Intrusion Signatures and Analysis
Proceedings of the Third International Workshop on Multiple Classifier Systems
MCS '02 Proceedings of the Third International Workshop on Multiple Classifier Systems
Results of the KDD'99 classifier learning
ACM SIGKDD Explorations Newsletter
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Training a neural-network based intrusion detector to recognize novel attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Intrusion detection using hierarchical neural networks
Pattern Recognition Letters
Probabilistic suffix models for API sequence analysis of Windows XP applications
Pattern Recognition
Using genetic feature selection for improving cyber attack detection rate
ACST'07 Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology
Processing of massive audit data streams for real-time anomaly intrusion detection
Computer Communications
Data base support for intrusion detection with honeynets
TELE-INFO'07 Proceedings of the 6th WSEAS Int. Conference on Telecommunications and Informatics
Autonomous decision on intrusion detection with trained BDI agents
Computer Communications
Estimation and decision fusion: A survey
Neurocomputing
Sensing Attacks in Computers Networks with Hidden Markov Models
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Adversarial Pattern Classification Using Multiple Classifiers and Randomisation
SSPR & SPR '08 Proceedings of the 2008 Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition
McPAD: A multiple classifier system for accurate payload-based anomaly detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information fusion for computer security: State of the art and open issues
Information Fusion
Ensemble Based Data Fusion for Gene Function Prediction
MCS '09 Proceedings of the 8th International Workshop on Multiple Classifier Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Improvement in intrusion detection with advances in sensor fusion
IEEE Transactions on Information Forensics and Security
An efficient network intrusion detection
Computer Communications
A modular multiple classifier system for the detection of intrusions in computer networks
MCS'03 Proceedings of the 4th international conference on Multiple classifier systems
An intrusion detection based on support vector machines with a voting weight schema
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
Testing ensembles for intrusion detection: On the identification of mutated network scans
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Principal component neural networks based intrusion feature extraction and detection using SVM
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Hierarchical classification of object images using neural networks
ISNN'06 Proceedings of the Third international conference on Advnaces in Neural Networks - Volume Part II
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Empirical study on fusion methods using ensemble of RBFNN for network intrusion detection
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
Network intrusion detection by combining one-class classifiers
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Effectiveness evaluation of data mining based IDS
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
Using attack-specific feature subsets for network intrusion detection
AI'06 Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence
Multiple classifier systems under attack
MCS'10 Proceedings of the 9th international conference on Multiple Classifier Systems
Automatically building datasets of labeled IP traffic traces: A self-training approach
Applied Soft Computing
Automatic network intrusion detection: Current techniques and open issues
Computers and Electrical Engineering
Hi-index | 0.10 |
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have been currently developed. Intrusion Detection Systems aim at detecting intruders who elude "first line" protection. In this paper, a pattern recognition approach to network intrusion detection based on the fusion of multiple classifiers is proposed. Five decision fusion methods are assessed by experiments and their performances compared. The potentialities of classifier fusion for the development of effective intrusion detection systems are evaluated and discussed.