Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective technique to facilitate anomaly detection. However, existing approaches based on GH-SOM are not able to adapt online to the ever-changing problem domain of network intrusion. This results in low accuracy in identifying network intrusions, particularly “unknown ” attacks. In this paper, we propose an adaptive GHSOM based approach (A-GHSOM) to network intrusion detection. It consists of four significant enhancements: enhanced threshold-based training, dynamic input normalization, feedback-based quantization error threshold adaptation, and prediction confidence filtering and forwarding. We test the capability of the A-GHSOM approach for intrusion d...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Includes bibliographical references (leaves 71-75).A Network Intrusion Detection System (NIDS) is an...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
The accurate detection of attacks in ad hoc computer networks is made significantly more difficult i...
A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all netwo...
Traditional intrusion detection systems (IDSs) focus on low-level attacks and anomalies, and raise a...
The rapid development of internet and network technology followed by malicious threats and attacks o...
Network intrusion detection technology based on artificial neural network is an important research d...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
A novel multilevel hierarchicalKohonen Net (K-Map) for an intrusion detection system is presented. E...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Includes bibliographical references (leaves 71-75).A Network Intrusion Detection System (NIDS) is an...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
The accurate detection of attacks in ad hoc computer networks is made significantly more difficult i...
A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all netwo...
Traditional intrusion detection systems (IDSs) focus on low-level attacks and anomalies, and raise a...
The rapid development of internet and network technology followed by malicious threats and attacks o...
Network intrusion detection technology based on artificial neural network is an important research d...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
A novel multilevel hierarchicalKohonen Net (K-Map) for an intrusion detection system is presented. E...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...