Application of online-training SVMs for real-time intrusion detection with different considerations
- 18 July 2005
- journal article
- Published by Elsevier BV in Computer Communications
- Vol. 28 (12), 1428-1442
- https://doi.org/10.1016/j.comcom.2005.01.014
Abstract
No abstract availableKeywords
Funding Information
- Ministry of Education, Culture, Sports, Science and Technology
This publication has 20 references indexed in Scilit:
- Online training of support vector classifierPattern Recognition, 2003
- The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errorsExpert Systems with Applications, 2003
- Robust support vector machine with bullet hole image classificationIEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews), 2002
- Multivariate statistical analysis of audit trails for host-based intrusion detectionIEEE Transactions on Computers, 2002
- Use of K-Nearest Neighbor classifier for intrusion detectionComputers & Security, 2002
- First‐order versus high‐order stochastic models for computer intrusion detectionQuality and Reliability Engineering International, 2002
- Estimating the Support of a High-Dimensional DistributionNeural Computation, 2001
- A framework for constructing features and models for intrusion detection systemsACM Transactions on Information and System Security, 2000
- The analysis of decomposition methods for support vector machinesIEEE Transactions on Neural Networks, 2000
- Statistical foundations of audit trail analysis for the detection of computer misuseIEEE Transactions on Software Engineering, 1993