Intrusion Detection Systems (IDS’s) monitor the traffic in computer networks for detecting suspect activities. Connectionist techniques can support the development of IDS’s by modeling ‘normal’ traffic. This paper presents the application of some unsupervised neural methods to a packet dataset for the first time. This work considers three unsupervised neural methods, namely, Vector Quantization (VQ), Self-Organizing Maps (SOM) and Auto-Associative Back-Propagation (AABP) networks. The former paradigm proves quite powerful in supporting the basic space-spanning mechanism to sift normal traffic from anomalous traffic. The SOM attains quite acceptable results in dealing with some anomalies while it fails in dealing with some others. The AABP m...
This paper reviews one nonlinear and two linear projection architectures, in the context of a compar...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
Intrusion Detection Systems (IDS's) monitor the traffic in computer networks for detecting suspect a...
Intrusion detection systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Intrusion Detection Systems (IDS’s) are essential components in a network communication infrastructu...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile ...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
This research approaches the anomalous situations detection issue from a pattern recognition point o...
This paper reviews one nonlinear and two linear projection architectures, in the context of a compar...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
Intrusion Detection Systems (IDS's) monitor the traffic in computer networks for detecting suspect a...
Intrusion detection systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Intrusion Detection Systems (IDS’s) are essential components in a network communication infrastructu...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile ...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
This research approaches the anomalous situations detection issue from a pattern recognition point o...
This paper reviews one nonlinear and two linear projection architectures, in the context of a compar...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...