Seeing the Forest Through the Trees: Learning a Comprehensible Model from an Ensemble, Machine Learning: ECML 2007, pp.418-429, 2007. ,
DOI : 10.1007/978-3-540-74958-5_39
Trust-based solution for robust self-configuration of distributed intrusion detection systems, pp.121-126, 2012. ,
Extending bagging for imbalanced data, pp.269-278, 2013. ,
Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001. ,
DOI : 10.1023/A:1010933404324
Flow classification using clustering and association rule mining, Computer Aided Modeling, Analysis and Design of Communication Links and Networks (CA- MAD) 15th IEEE International Workshop on, pp.76-80, 2010. ,
Using random forest to learn imbalanced data, 2004. ,
Cisco systems netflow services export version 9, 2004. ,
DOI : 10.17487/rfc3954
A hybrid network intrusion detection framework based on random forests and weighted k-means, Ain Shams Engineering Journal, vol.4, issue.4, pp.753-762, 2013. ,
Do we need hundreds of classifiers to solve real world classification problems?, The Journal of Machine Learning Research, vol.15, issue.1, pp.3133-3181, 2014. ,
Semi-supervised learning from unbalanced labeled data?an improvement, Knowledge-Based Intelligent Information and Engineering Systems, pp.802-808, 2004. ,
Lightweight application classification for network management, Proceedings of the 2007 SIGCOMM workshop on Internet network management , INM '07, pp.299-304, 2007. ,
DOI : 10.1145/1321753.1321771
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.4362
BLINC, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.229-240, 2005. ,
DOI : 10.1145/1090191.1080119
A survey of recent trends in one class classification, In Artificial Intelligence and Cognitive Science, pp.188-197, 2010. ,
Learning Intrusion Detection: Supervised or Unsupervised?, pp.50-57, 2005. ,
DOI : 10.1007/11553595_6
Unsupervised anomaly detection in network intrusion detection using clusters, pp.333-342, 2005. ,
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000. ,
DOI : 10.1145/382912.382923
Behavior rule based intrusion detection, Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, Co-Next Student Workshop '09, pp.57-58, 2009. ,
DOI : 10.1145/1658997.1659028
Analysis of kdd99 intrusion detection dataset for selection of relevance features, Proceedings of the World Congress on Engineering and Computer Science, pp.20-22, 2010. ,
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems, Sixth International Conference on Data Mining (ICDM'06), pp.488-498, 2006. ,
DOI : 10.1109/ICDM.2006.165
The challenges of rich features in universal steganalysis, 2013. ,
Camnep: agent-based network intrusion detection system, pp.133-136, 2008. ,
Adaptive Multiagent System for Network Traffic Monitoring, IEEE Intelligent Systems, vol.24, issue.3, pp.16-25, 2009. ,
DOI : 10.1109/MIS.2009.42
Fine-grained traffic classification with netflow data, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ, IWCMC '10, pp.479-483, 2010. ,
DOI : 10.1145/1815396.1815507
A survey of network traffic monitoring and analysis tools. Cse 576m computer system analysis project, 2009. ,
An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, pp.343-356, 2010. ,
DOI : 10.1109/SURV.2010.032210.00054
A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. ,
DOI : 10.1109/CISDA.2009.5356528
Intrusion detection by machine learning: A review, Expert Systems with Applications, vol.36, issue.10, pp.11994-12000, 2009. ,
DOI : 10.1016/j.eswa.2009.05.029
Random-Forests-Based Network Intrusion Detection Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.38, issue.5, pp.649-659, 2008. ,
DOI : 10.1109/TSMCC.2008.923876