In this paper, we review a visual approach and propose it for analysing computer-network activity, which is based on the use of unsupervised connectionist neural network models and does not rely on any previous knowledge of the data being analysed. The presented Intrusion Detection System (IDS) is used as a method to investigate the traffic which travels along the analysed network, detecting SNMP (Simple Network Management Protocol) anomalous traffic patterns. In this paper we have focused our attention on the study of anomalous situations generated by a MIB (Management Information Base) information transfer
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
This research approaches the anomalous situations detection issue from a pattern recognition point o...
Thework presented in this paper shows the capability of a connectionist model, based on a statistica...
This work describes ongoing multidisciplinary research which aims to analyse and to apply connection...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
The goal of Network Intrusion Detection Systems (NIDSs) is to protect against attacks by inspecting ...
Intrusion Detection Systems (IDS's) monitor the traffic in computer networks for detecting suspect a...
none4Network intrusion detection is a key security issue that can be tackled by means of different a...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
In this work an Intrusion Detection System to detect anomalies in networks system entries is present...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
This research approaches the anomalous situations detection issue from a pattern recognition point o...
Thework presented in this paper shows the capability of a connectionist model, based on a statistica...
This work describes ongoing multidisciplinary research which aims to analyse and to apply connection...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
The goal of Network Intrusion Detection Systems (NIDSs) is to protect against attacks by inspecting ...
Intrusion Detection Systems (IDS's) monitor the traffic in computer networks for detecting suspect a...
none4Network intrusion detection is a key security issue that can be tackled by means of different a...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
In this work an Intrusion Detection System to detect anomalies in networks system entries is present...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this wo...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...