2009
DOI: 10.1016/j.eswa.2008.06.138
|View full text |Cite
|
Sign up to set email alerts
|

Data mining-based intrusion detectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 100 publications
(36 citation statements)
references
References 8 publications
0
36
0
Order By: Relevance
“…However, Hansen and Salamon [6] had proved that multi-classifiers will only work when it is possible to build individual classifiers which are more than 50% accurate.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…However, Hansen and Salamon [6] had proved that multi-classifiers will only work when it is possible to build individual classifiers which are more than 50% accurate.…”
Section: Discussionmentioning
confidence: 99%
“…By adopting an effective intrusion detection system (IDS) as 2 nd line of defence, the threat attacks can also be is eliminated before they get into the system [4]. Total cost of recovery from network epidemics like Nimda, Bagle, Code Red, SQL Slammer, and Mpvars attacks [6] are ginormous to the whole society. Especially in some circumstances, the accuracy of the classifiers is so crucial that a wrong prediction of attacks may result in extraordinarily high costs.…”
Section: Three-layer Hierarchy Ensemble Classifier Approachmentioning
confidence: 99%
See 3 more Smart Citations