Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290)
DOI: 10.1109/ijcnn.2002.1007774
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection using neural networks and support vector machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

2
245
1
12

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 561 publications
(283 citation statements)
references
References 4 publications
2
245
1
12
Order By: Relevance
“…In machine learning, support vector machines (SVMs, also support vector networks) [14] When data is not labeled, a supervised learning is not possible, and an unsupervised learning is required, that would find natural clustering of the data to groups, and map new data to these formed groups. The clustering algorithm which provides an improvement to the support vector machines is called support vector clustering (SVC) [14] and is highly used in industrial applications either when data is not labeled or when only some data is labeled as a preprocessing for a classification pass; the clustering method was published.…”
Section: B) Support Vector Machine (Svm)mentioning
confidence: 99%
See 2 more Smart Citations
“…In machine learning, support vector machines (SVMs, also support vector networks) [14] When data is not labeled, a supervised learning is not possible, and an unsupervised learning is required, that would find natural clustering of the data to groups, and map new data to these formed groups. The clustering algorithm which provides an improvement to the support vector machines is called support vector clustering (SVC) [14] and is highly used in industrial applications either when data is not labeled or when only some data is labeled as a preprocessing for a classification pass; the clustering method was published.…”
Section: B) Support Vector Machine (Svm)mentioning
confidence: 99%
“…The clustering algorithm which provides an improvement to the support vector machines is called support vector clustering (SVC) [14] and is highly used in industrial applications either when data is not labeled or when only some data is labeled as a preprocessing for a classification pass; the clustering method was published.…”
Section: B) Support Vector Machine (Svm)mentioning
confidence: 99%
See 1 more Smart Citation
“…But for security practitioners, it is especially important, as a wide swath of security-sensitive applications build on machine learning technology, including intrusion detection systems, virus and worm detection systems, and spam filters [13,14,18,20,24].…”
Section: Introductionmentioning
confidence: 99%
“…K-Means Clustering: Although previous work used neural networks for intrusion detection [20,21], we choose K-means clustering [22] to build the models of filesystem and network behavior. This decision is based on a smallscale (four-user) three-month user study on the network-based technique.…”
mentioning
confidence: 99%