18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Como trabalhos futuros, é interessante investigar um mo<strong>de</strong>lo capaz <strong>de</strong> melhorar<br />

o <strong>de</strong>sempenho da <strong>de</strong>tecção para as classes <strong>de</strong> ataque R2L e U2L. Também é importante<br />

testar a metodologia proposta em outras bases <strong>de</strong> dados para avaliar a sua robustez ou<br />

até mesmo em uma base <strong>de</strong> dados gerada a partir <strong>de</strong> tráfego real, como sugerido por<br />

[Paxson 2007], visto que os tipos <strong>de</strong> ataque <strong>de</strong> hoje diferem dos existentes na base<br />

KDDKUP’99.<br />

Referências<br />

Abraham, A., Grosan, C. and Vi<strong>de</strong>, C. M. (2007). Evolutionary Design of Intrusion<br />

Detection Programs. In International Journal of Network Security, pages 328-339.<br />

Borji, A. (2007). Combining Heterogeneous Classifiers for Network Intrusion<br />

Detection. In Lecture Notes in Computer Science, Volume 4846, pages 254-260.<br />

Springer.<br />

Breiman, L. (1996). Bagging Predictors. In Machine Learning 24(3), pages 123–140.<br />

Breiman, L. (2001). Random Forests. In Journal of Machine Learning, Vol.45, pages 5-<br />

32. Kluwer Aca<strong>de</strong>mic, Netherland.<br />

Chou, T. , Fan, J., Fan, S. and Makki, K. (2009). Ensemble of machine learning<br />

algorithms for intrusion <strong>de</strong>tection. In Systems, Man and Cybernetic, pages 3976-<br />

3980.<br />

Debar, H., Dacier, M. and Wespi, A. (2000).A Revised Taxonomy for Intrusion<br />

Detection Systems. Annals of Telecommunications, pages 361-378.<br />

Elkan, C. (2000). Results of the KDD’99 Classifier Learning. In SIGKDD Explorations,<br />

ACM SIGKDD.<br />

Freund, Y. and Schapire, R. E. (1996). Experiments with a new boosting algorithm. In<br />

Thirteenth International Conference on Machine Learning, pages 148-156.<br />

Geurts, P., Ernst, D. and Wehenkel, L. (2006). Extremely randomized trees. In Machine<br />

Learning, Vol. 63, pages 3-42.<br />

Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P. and Witten, I. H. (2009).<br />

The WEKA Data Mining Software: An Update. In SIGKDD Explorations, Volume<br />

11, Issue 1.<br />

John, G. H. and Langley, P. (1995). Estimating Continuous Distributions in Bayesian<br />

Classifiers. In Eleventh Conference on Uncertainty in Artificial Intelligence, pages<br />

338-345.<br />

Kuncheva, L. I. (2004). Combining Pattern Classifiers: Methods and Algorithms. John<br />

Wiley & Sons, Inc.<br />

Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A. and Srivastava, J. (2003). A comparative<br />

study of anomaly <strong>de</strong>tection schemes in network intrusion <strong>de</strong>tection. In Proceedings of<br />

the Third SIAM Conference on Data Mining.<br />

Lee, W., Stolfo, S. J. and Mok, K. W. (1999). A Data Mining Framework for Building<br />

Intrusion Detection Mo<strong>de</strong>ls. In IEEE Symposium on Security and Privacy, pages.<br />

120-132.<br />

223

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!