The main purpose of this paper is to propose a novel soft computing inference engine model for intrusion detection. Our approach is anomaly based and utilizes causal knowledge inference based fuzzy cognitive maps (FCM) and multiple self organizing maps (SOM). A set of parallel neural network classifiers (SOM) are used to do an initial recognition of the network traffic flow to detect abnormal behavior. The FCM incorporate to eliminate ambiguities of odd neurons and making final decisions. Initially, each neuron is mapped to its best matching unit in the self organizing map and then updated by the fuzzy cognitive map framework. This updating is achieved through the weights of the neighboring neurons. Based on the domain knowledge of network ...
Abstract: Network Intrusion Detection has been an active area of research with the growing incidence...
Abstract — As intrusion detection systems are vital and critical components in the field of computer...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
The basic function of anomaly-based sensors is to detect any deviation from normal system behavior....
Conventional approaches to intrusion detection system pose a myriad of problems that exhibit serious...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Network intrusion is a growing threat with potentially severe impacts, which can be damaging in mult...
Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to In...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
This research created a new theoretical Soft Computing (SC) hybridized network intrusion detection d...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Intrusion Detection Systems (IDS) form a key part of system defence, where it identifies abnormal ac...
Abstract: Network Intrusion Detection has been an active area of research with the growing incidence...
Abstract — As intrusion detection systems are vital and critical components in the field of computer...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
The basic function of anomaly-based sensors is to detect any deviation from normal system behavior....
Conventional approaches to intrusion detection system pose a myriad of problems that exhibit serious...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
Network intrusion is a growing threat with potentially severe impacts, which can be damaging in mult...
Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to In...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
This research created a new theoretical Soft Computing (SC) hybridized network intrusion detection d...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Intrusion Detection Systems (IDS) form a key part of system defence, where it identifies abnormal ac...
Abstract: Network Intrusion Detection has been an active area of research with the growing incidence...
Abstract — As intrusion detection systems are vital and critical components in the field of computer...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...