We note, however, that the difference in accuracy figures tend to be very small and may not be statistically significant, especially in view of the fact that the 5 classes of patterns differ in their sizes tremendously. More definitive conclusions can only be made after analyzing more comprehensive sets of network traffic data.
Denning D. (1987) “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, pp.222-232.
Kumar S., Spafford E. H. (1994) “An Application of Pattern Matching in Intrusion Detection,” Technical Report CSD-TR-94-013. Purdue University.
Cannady J. (1998) “Applying Neural Networks for Misuse Detection,” Proceedings of 21st National Information Systems Security Conference, pp.368-381.
Ryan J., Lin M-J., Miikkulainen R. (1998) “Intrusion Detection with Neural Networks,” Advances in Neural Information Processing Systems, Vol. 10, Cambridge, MA: MIT Press.
Mukkamala S., Janoski G., Sung A. H. (2002) “Intrusion Detection Using Neural Networks and Support Vector Machines,” Proceedings of IEEE International Joint Conference on Neural Networks, pp.1702-1707.
Stolfo J., Wei F., Lee W., Prodromidis A., and Chan P. K. (1999) “Cost-based Modeling and Evaluation for Data Mining with Application to Fraud and Intrusion Detection,” Results from the JAM Project by Salvatore.
Mukkamala S., Sung A. H. (2002) “Identifying Key Features for Intrusion Detection Using Neural Networks,” Proceedings of ICCC International Conference on Computer Communications, pp. 1132-1138.
Banzhaf. W., Nordin. P., Keller. E. R., Francone F. D. (1998) “Genetic Programming : An Introduction on The Automatic Evolution of Computer Programs and its Applications,” Morgan Kaufmann Publishers, Inc.
AIMLearning Technology, http://www.aimlearning.com.
Brameier. M., Banzhaf. W. (2001) “A comparison of linear genetic programming and neural networks in medical data mining, Evolutionary Computation,” IEEE Transactions on, Volume: 5(1), pp. 17-26.
Riedmiller M., and Braun H. (1993) “A direct adaptive method for faster back propagation learning: The RPROP algorithm”, Proceedings of the IEEE International Conference on Neural Networks.
Joachims T. (1998) “Making Large-Scale SVM Learning Practical,” LS8-Report, University of Dortmund, LS VIII-Report.
Joachims T. (2000) “SVMlight is an Implementation of Support Vector Machines (SVMs) in C,” http://ais.gmd.de/~thorsten/svm_light. University of Dortmund. Collaborative Research Center on Complexity Reduction in Multivariate Data (SFB475).
Vladimir V. N. (1995) “The Nature of Statistical Learning Theory,” Springer.
Kendall K. (1998) “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems”, Master's Thesis, Massachusetts Institute of Technology.
Webster S. E. (1998) “The Development and Analysis of Intrusion Detection Algorithms,”
S. Thesis, Massachusetts Institute of Technology.