ACKNOWLEDGEMENTS
Support for this research received from ICASA (Institute
for Complex Additive Systems Analysis, a division of
New Mexico Tech), U.S. Department of Defense IASP and
NSF capacity building grant is gratefully acknowledged,
as well as for FCT PRAXIS XXI research fellowship,
Science & Technology Foundation - Portugal. Finally, we
would also like to acknowledge many insightful
conversations with Dr. Jean-Louis Lassez and David
Duggan that helped clarify some of our ideas.
REFERENCES
Abraham A., Ramos V., 2003. Web Usage Mining Using
Artificial Ant Colony and Genetic Programming,
Congress on Evolutionary Computation (CEC’03),
IEEE Press, pp. 1384-1391.
Abraham A., Steinberg D., 2001. MARS: Still an Alien
Planet in Soft Computing? International Conference
on Computational Science, Springer-Verlag Germany,
Lecture Notes in Computer Science 2074, pp. 235-
244.
Bishop C. M., Neural Networks for Pattern Recognition,
Oxford Press, 1995.
Cannady J., 1998. Artificial Neural Networks for Misuse
Detection. National Information Systems Security
Conference.
Cramer M., et. al. 1995. New Methods of Intrusion
Detection using Control-Loop Measurement.
Proceedings of the Technology in Information Security
Conference (TISC), pp. 1-10.
Debar H., Becke M., Siboni D., 1992a. A Neural Network
Component for an Intrusion Detection System.
Proceedings of the IEEE Computer Society
Symposium on Research in Security and Privacy.
Debar H., Dorizzi. B., 1992b. An Application of a
Recurrent Network to an Intrusion Detection System.
Proceedings of the International Joint Conference on
Neural Networks, pp.78-83.
Denning D., 1987. An Intrusion-Detection Model. IEEE
Trans. on Software Engineering, Vol.SE-13, Nº 2.
Friedman, J. H, 1991. Multivariate Adaptive Regression
Splines, Annals of Statistics, Vol 19, pp. 1-141.
Ghosh A. K., 1999. Learning Program Behavior Profiles
for Intrusion Detection. USENIX.
Joachims T., 1998. Making Large-Scale SVM Learning
Practical. University of Dortmund, LS8-Report, LS
VIII-Report.
Joachims T., 2000. SVMlight is an Implementation of
Support Vector Machines (SVMs) in C. University of
Dortmund. Collaborative Research Center on
Complexity Reduction in Multivariate Data (SFB475):
<http://ais.gmd.de/~thorsten/svm_light>.
Kendall K., 1998. A Database of Computer Attacks for the
Evaluation of Intrusion Detection Systems. Master's
Thesis, Massachusetts Institute of Technology.
Kumar S., Spafford E. H., 1994. An Application of Pattern
Matching in Intrusion Detection. Technical Report
CSD-TR-94-013, Purdue University.
Lincoln Laboratory, Massachusetts Institute of
Technology (MIT), 1998-2000. DARPA Intrusion
Detection Evaluation:
<www.ll.mit.edu/IST/ideval/data/data_index.html>.
Luo J., Bridges S. M., 2000. Mining Fuzzy Association
Rules and Fuzzy Frequency Episodes for Intrusion
Detection. International Journal of Intelligent
Systems, John Wiley & Sons, pp. 687-703.
Moller A.F., 1993. A Scaled Conjugate Gradient
Algorithm for Fast Supervised Learning. Neural
Networks. Vol. (6), pp. 525-533.
Mukkamala S., Janoski G., Sung A. H., 2002a. Intrusion
Detection Using Neural Networks and Support Vector
Machines. Proceedings of IEEE International Joint
Conference on Neural Networks, pp. 1702-1707.
Mukkamala S., Sung A. H., 2002b. Identifying Key
Features for Intrusion Detection Using Neural
Networks. Proceedings of ICCC International
Conference on Computer Communications 2002.
Ramos V., Abraham A., 2003. Swarms on Continuous
Data. Congress on Evolutionary Computation (CEC),
IEEE Press, pp. 1370-1375.
Ramos V., Muge F., Pina P., 2002. Self-Organized Data
and Image Retrieval as a Consequence of Inter-
Dynamic Synergistic Relationships in Artificial Ant
Colonies. Soft-Computing Systems – Design,
Management and Applications, IOS Press, Frontiers in
Artificial Intelligence and Applications, pp. 500-509.
Riedmiller M., Braun H., 1993. A direct adaptive method
for faster back propagation learning: The RPROP
algorithm. Proceedings of the IEEE International
Conference on Neural Networks.
Ryan J., Lin M-J., Miikkulainen R., 1998. Intrusion
Detection with Neural Networks. Advances in Neural
Information Processing Systems 10, Cambridge, MA:
MIT Press.
Steinberg, D, Colla P. L., Martin K., 1999. MARS User
Guide. Salford Systems, San Diego, CA.
Stolfo J., Fan W., Lee W., Prodromidis A., Chan P.K.,
2000. Cost-based Modeling and Evaluation for Data
Mining with Application to Fraud and Intrusion
Detection. DARPA Information Survivability
Conference.
University of California at Irvine, 1999. KDD Cup:
<http://kdd.ics.uci.edu/databases/kddcup99/task.htm>.
Vladimir V. N., The Nature of Statistical Learning Theory,
Springer-Verlag, Germany, 1995.
Webster S.E., 1998, The Development and Analysis of
Intrusion Detection Algorithms. S.M. Thesis,
Massachusetts Institute of Technology, June 1998.
INTRUSION DETECTION SYSTEMS USING ADAPTIVE REGRESSION SPLINES
33