The growth of the Internet and, consequently, the number of interconnected computers, has exposed significant amounts of information to intruders and attackers. Firewalls aim to detect violations according to a predefined rule-set and usually block potentially dangerous incoming traffic. However, with the evolution of attack techniques, it is more difficult to distinguish anomalies from normal traffic. Different detection approaches have been proposed, including the use of machine learning techniques based on neural models such as Self-Organizing Maps (SOMs). In this paper, we present a classification approach that hybridizes statistical techniques and SOM for network anomaly detection. Thus, while Principal Component Analysis (PCA) and Fis...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
The intrusion detection in computer networks is a complex research problem, which requires the under...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
Statistical Machine Learning methods are employed to improve network security (email spam filtering,...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Abstract. This paper proposes a method to detect network intrusions by using the PCASOM (principal c...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
The main purpose of this paper is to propose a novel soft computing inference engine model for intru...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Most current anomaly Intrusion Detection Systems (IDSs)detect computer network behavior as normal or...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
The intrusion detection in computer networks is a complex research problem, which requires the under...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
Statistical Machine Learning methods are employed to improve network security (email spam filtering,...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Abstract. This paper proposes a method to detect network intrusions by using the PCASOM (principal c...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
The main purpose of this paper is to propose a novel soft computing inference engine model for intru...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Most current anomaly Intrusion Detection Systems (IDSs)detect computer network behavior as normal or...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
The intrusion detection in computer networks is a complex research problem, which requires the under...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...