Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-Organizing Map (SOM) is used to construct the normal usage profiles of network traffic, and in the training phase and detection phase, the Vector Elimination Nearest-Neighbor Search (VENNS) algorithm is designed and implemented. The design procedure optimizes the performance of AID by jointly accounting for accurate usage profile modeling by SOM codebook and fast vector similarity measure using the fast Nearest-Neighbor search. In data processing, according to the characters of TCP attacks, a novel feature extraction approach of TCP flow state is implemented. Using the DARPA Intrusion Detection Evaluation Data Set, we implement the performance...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
By performing network traffic analyzing in different datasets, Intrusion Detection Systems (IDS) tha...
This thesis presents three new low-complexity intrusion detection algorithms tested on sniffing data...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Our research involved the application of supervised learning techniques to the field of network base...
The rapid development of internet and network technology followed by malicious threats and attacks o...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
Abstract. Intrusion detection System (IDS) is an important part of the security of large networks li...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
By performing network traffic analyzing in different datasets, Intrusion Detection Systems (IDS) tha...
This thesis presents three new low-complexity intrusion detection algorithms tested on sniffing data...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Our research involved the application of supervised learning techniques to the field of network base...
The rapid development of internet and network technology followed by malicious threats and attacks o...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
Abstract. Intrusion detection System (IDS) is an important part of the security of large networks li...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
By performing network traffic analyzing in different datasets, Intrusion Detection Systems (IDS) tha...
This thesis presents three new low-complexity intrusion detection algorithms tested on sniffing data...