共 12 条
- [1] Lee W., Stolfo S.J., Mok K.W., Et al., Adaptive intrusion detection: A data mining approach, Artificial Intelligence Review, 14, 6, pp. 533-567, (2000)
- [2] Brugger S.T., Data mining methods for network intrusion detection, (2004)
- [3] Portnoy L., Intrusion detection with unlabeled data using clustering, (2000)
- [4] Wang W., Yang J., Muntz R., STING: A statistical information grid approach to Spatial Data Mining, Proceedings of 23rd International Conference on Very Large Data Bases, pp. 186-195, (1997)
- [5] Guan Y., Ghorbani A., Belacel N., Y-means: A clustering method for intrusion detection, Proceedings of Canadian Conference on Electrical and Computer Engineering, pp. 1-4, (2003)
- [6] Guha S., Rastogi R., Shim K., ROCK: A robust clustering algorithm for categorical attributes, Information Systems, 25, 5, pp. 345-366, (2000)
- [7] Zhexue H., Extensions to the k-means algorithm for clustering large data sets with categorical values, Data Mining and Knowledge Discovery, 2, pp. 283-304, (1998)
- [8] KDD cup 1999 data, (1999)
- [9] Liu Y.-H., Tian D.-X., Yu X.-G., Wang J., Large-scale network intrusion detection algorithm based on distributed learning, Journal of Software, 19, 4, pp. 993-1003, (2008)
- [10] Wang Q., Megalooikonomu V., A clustering algorithm for intrusion detection, Proceedings of Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, pp. 31-38, (2005)