Network intrusion detection technology based on artificial neural network is an important research direction in intrusion detection area. This paper proposes a semi-supervised GHSOM (growing hierarchical self-organizing maps) neural network algorithm, in which the clustering process of large amount of unlabeled data is conducted by small amount of labeled data. On the one hand, the idea of semi-supervised cop-kmeans algorithm is introduced into the unsupervised GHSOM algorithm, and the problem on returning no result is solved in the semi-supervised GHSOM algorithm. On the other hand, the concept of neural entropy is proposed and used as the judgment condition of the neural network growth to improve precision of division of subnets of the ne...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Intrusion Detection System (IDS) is an example of Misuse Detection System that works for detecting m...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
To effectively and accurately detect and classify network intrusion data, this paper introduces a ge...
Due to the widespread use of the Internet, customer information is vulnerable to computer systems at...
Recent Intrusion Detection Systems (IDSs) which are used to monitor real-time attacks on computer an...
Abstract. This paper proposes a method to detect network intrusions by using the PCASOM (principal c...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
In the present milieu of connected world, where security is the major concern, Intrusion Detection S...
According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a n...
With the increase in Internet users the number of malicious users are also growing day-by-day posing...
Internet became one of life’s basics in these days. More networks are connected to the Internet ever...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Intrusion Detection System (IDS) is an example of Misuse Detection System that works for detecting m...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
To effectively and accurately detect and classify network intrusion data, this paper introduces a ge...
Due to the widespread use of the Internet, customer information is vulnerable to computer systems at...
Recent Intrusion Detection Systems (IDSs) which are used to monitor real-time attacks on computer an...
Abstract. This paper proposes a method to detect network intrusions by using the PCASOM (principal c...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
In the present milieu of connected world, where security is the major concern, Intrusion Detection S...
According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a n...
With the increase in Internet users the number of malicious users are also growing day-by-day posing...
Internet became one of life’s basics in these days. More networks are connected to the Internet ever...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Intrusion Detection System (IDS) is an example of Misuse Detection System that works for detecting m...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...