Abstract
Many approaches have been proposed so far to tackle computer network security. Among them, several systems exploit Pattern Recognition techniques, by regarding malicious behavior detection as a classification problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
C.-C. Chang, C.-J. Lin, LIBSVM: A Library for Support Vector Machines, 2001.
W.W. Cohen, Y. Singer. Simple, Fast, and Effective Rule Learner. In Proceedings of the 16th National Conf. on Artificial Intelligence and 11th Conf. on Innovative Applications of Artificial Intelligence, Orlando (FL), USA, pp. 335–342, July 18–22, 1999.
C. Elkan, Results of the KDD99 classifier learning, ACM SIGKDD Explorations 1, pp. 63–64, 2000.
M. Esposito, C. Mazzariello, F. Oliviero, S. P. Romano, C. Sansone, Real Time Detection of Novel Attack by Means of Data Mining Techniques. In: C.-S. Chen, J. Filipe, I. Seruca, J. Cordeiro (Eds.), Enterprise Information Systems VII, Springer-Verlag, pp. 197–204, 2006.
T. Fawcett, An introduction to ROC analysis, Pattern Recognition Letters vol. 27, pp. 861–874, 2006.
F. Gargiulo, C. Mazzariello, C. Sansone, Information Fusion techniques for reliably Training Intrusion Detection System. In Proc. of IWAPR 2007, Springer Verlag, 2007 (in press).
G. Giacinto, F. Roli, L. Didaci, Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795–1803, 2003.
J. Gordon, E.H. Shortliffe, The Dempster-Shafer Theory of Evidence, in B.G. Buchanan and E.H. Shortliffe (Eds.), Rule-Based Expert Systems, Addison-Wesley, pp. 272–292, 1984.
L.I. Kuncheva, Switching Between Selection and Fusion in Combining Classifiers: An Experiment. In IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 32, no. 2, 2002.
L.I. Kuncheva, J.C. Bezdek, R.P.W. Duin, Decision templates for multiple classifier fusion: an experimental comparison. In Pattern Recognition, vol. 34, pp. 299–314. 2001.
P. Laskov, P. Daussei, C. Schafer, K. Rieck, Learning intrusion detection: supervised or unsupervised?, in F. Roli and S. Vitulano (Eds.), Lecture Notes in Computer Science, vol. 3617, Springer-Verlag, Berlin, pp. 50–57, 2005.
M.V. Mahoney, P.K. Chan, An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, in G. Vigna, E. Jonsson, C. Kruegel (Eds.), LNCS vol. 2820, Proceedings of RAID 2003, pp. 220–238, 2003.
L. Xu, A. Krzyzak, C.Y. Suen, Methods of Combining Multiple Classifiers and Their Applications to Handwriting Recognition. IEEE Trans, on SMC., Vol. 22, pp. 418–435, 1992.
S. Zanero, Analyzing tcp traffic patterns using self organizing maps, in F. Roli and S. Vitulano (Eds.), Lecture Notes in Computer Science, vol. 3617, Springer-Verlag, Berlin, pp. 8390, 2005.
C. Zhang, J. Jiang, M. Kamel, Intrusion detection using hierarchical neural networks. Pattern Recognition Letters 26(6), pp. 779–791, 2005.
X. Zhu, Semi-Supervised Learning Literature Survey, Computer Sciences, University of Wisconsin-Madison 1530, http://www.cs.wisc.edu/~jerryzhu/pub/ssLsurvey.pdf, 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gargiulo, F., Mazzariello, C., Sansone, C. (2007). A Self-training Approach for Automatically Labeling IP Traffic Traces. In: Kurzynski, M., Puchala, E., Wozniak, M., Zolnierek, A. (eds) Computer Recognition Systems 2. Advances in Soft Computing, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75175-5_88
Download citation
DOI: https://doi.org/10.1007/978-3-540-75175-5_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75174-8
Online ISBN: 978-3-540-75175-5
eBook Packages: EngineeringEngineering (R0)