54
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Network Anomaly Detection Based on BQPSO-BN Algorithm

&
Pages 334-342 | Published online: 01 Sep 2014

References

  • R S Puttini, Z Marrakchi, and L Me, “A Bayesian Classification Model for Real-Time Intrusion Detection,” Proceedings of the 22nd International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering, Moscow, Idaho, Vol. 659, pp. 150–62, Aug. 2002.
  • S Mukkamala, A Sung, and A Abraham, “Intrusion detection using an ensemble of intelligent paradigms,” Journal of Network and Computer Applications, Vol. 28, no. 2, pp. 167–82, 2005.
  • J Zhang, and J Gong, “An Anomaly Detection Method Based on Fuzzy Judgment,” Journal of Computer Research and Development, Vol. 40, no. 6, pp. 776–83, Jun. 2003.
  • Y Yu, and H Huang, “An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm,” Journal of Software, Vol. 18, no. 6, pp. 1369–78, Jun. 2007.
  • A Lazarevic, L Ertoz, V Kumar, A Ozgur, and J Srivastava, “A comparative study of anomaly detection schemes in network intrusion detection,” Proceedings of the 3rd SIAM International Conference on Data Mining, pp. 25–36, 2003.
  • T Shon, J Seo, and J Moon J, “SVM approach with a genetic algorithm for network intrusion detection,” Proceedings of the 20th International Symposium on Computer and Information Sciences, Berlin: Springer Verlag; pp. 224–33, 2005.
  • B Yocom, R Birdsall, and D Poletti-Metzel, “Gigabit intrusion detection systems,” at Network World, available from: http://www.networkworld.com/reviews/2002/1104rev.html, [Last accessed on Nov 2002].
  • C Kruegel, D Mutz, W Robertson, and F Valeur, “Bayesian event classification for intrusion detection,” Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NE , pp.14–23, Dec. 2003.
  • K Johansen, and S Lee, “CS424 network security: Bayesian Network Intrusion Detection (BINDS),” http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.8479, May. 2003.
  • G F Cooper, and E A Herskovits, “A Bayesian method for the induction of probabilistic networks from data,” Machine Learning, no. 9, pp. 309–47, 1992.
  • Roure, J. (2004b). Incremental hill-climbing search applied to bayesian network structure learning. Workshop of Knowledge Discovery on Data Streams, (KDDS-ECML) J R Alcobé, “Incremental Hill-climbing search applied to Bayesiannetwork structure learning,” Proceedings of the 1st Workshop of Knowledge Discovery on Data Streams, (KDDS-ECML), Pisa, Italy, pp. 561–70, 2004.
  • P Larrañaga, M Poza, Y Yurramendi, R H Murga, and C M Kuijpers, “Structure learning of Bayesian networks by genetical algorithms: A performance analysis of control parameters,” IEEE Trans Pattern Anal Mach Intell, no. 18, pp. 912–26, 1996.
  • W Lam, and F Bacchus, “Learning Bayesian belief networks-an approach based on the MDL principle,” Comput Intell, no. 10, pp. 269–93, 1994.
  • T Wang, and J Yang, “A heuristic method for learning Bayesian networks using discrete particle swarm optimization,” Knowledge and information systems, no. 24, pp. 269–81, 2010.
  • A Salman, I Ahmad, and S Al-Madani, “Particle swarm optimization for task assignment problem,” Microprocessors and Microsystems, no. 26, pp. 363–71, 2002.
  • X L Li, “A Particle Swarm Optimization and Immune Theory-Based Algorithm for Structure Learning of Bayesian Networks,” International Journal of Database Theory and Application, Vol. 3, no. 2, pp. 61–70, 2010.
  • X L Li, S C Wang, and X D He, “Learning Bayesian networks structures based on memory binary particle swarm optimization,” Proceedings of 6th International Conference SEAL, Hefei, China, pp. 568–74, 2006.
  • F Van den Bergh, and A P Engelbrecht, “A New Locally Convergent Particle Swarm Optimiser. Proceedings of the IEEE Conference on Systems, Man and Cybernetics, Hammamet, Tunisia, pp.96–101, 2002.
  • J Kennedy, and R C Eberhart, “Particle Swarm Optimization. Proceedings of IEEE 1995 International Conference on Neural Network,” IV. Piscataway, NJ, pp. 1942–8, 1995.
  • J Sun, B Feng, and W B Xu, “Particle Swarm Optimization with Particles Having Quantum Behavior,” Proceedings of the IEEE Congress on Evolutionary Computation, Portland, Oregon: IEEE Press; pp. 325–31, 2004.
  • F Van den Bergh, “An Analysis of Particle Swarm Optimizers. Master thesis, South Africa: Departement of Computer Science,” University of Pretoria, Nov. 2001.
  • J Pearl, and S Russell, “Bayesian networks,” Technical Report Tech. Rep. R-216, Computer Science Department, University of California, Los Angeles, 2000.
  • J Suzuki, “Learning Bayesian belief networks based on the minimum description length principle: Basic properties,” IEICE-Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, pp. 2237–45, 1999.
  • J Cheng, R Greiner, J Kelly, D Bell, and W Liu, “Learning Bayesian network from data: An information-theory based approached,” Artificial Intelligence, no. 137, pp. 43–90, 2002.
  • D M Chickering, “Learning Bayesian networks is NP-complete,” In: D Fisher, and H J Lenz, (editors.), Learning from Data: Artificial Intelligence and Statistics V. Berlin: Springer; pp. 121–30, 1996.
  • G F Cooper, and E A Herskovits, “A Bayesian method for the induction of probabilistic networks from data,” Machine Learning, no. 9, pp. 309–47, 1992.
  • S T Sarasama, Q A Zhu, and J Huff, “Hierarchical kohonen Net for Anomaly Detection in Network Security,” IEEE Transactions on Systems, Man and Cybernatics-Part B: Cybernatics, Vol. 35, no. 2, pp. 302–12, 2005.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.