Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. We present an approach to the process of misuse detection that utilizes the analytical strengths of neural networks, and we provide the results from our preliminary analysis of this approach
With the increasing number of computers being connected to the Internet, security of an information ...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Fraud detection refers to the attempt to detect illegitimate usage of a communications network. Thre...
The aim of the present paper is a neural network approach to intrusion detection. Misuse detection i...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
With the rapid expansion of computer networks during the past few years, security has become a cruci...
Abstract:- Intrusion Detection is a major focus of research in the security of computer systems and ...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
© International Research Publication House This paper discusses the concept and problem of detecting...
The increasing complexity of today's information technology (IT) together with our dependency upon i...
With an increase in the number of internet users, the number of cyber-attacks happening in organizat...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Many bot-based attacks have been recorded globally in recent years. To carry out their harmful actio...
With the increasing number of computers being connected to the Internet, security of an information ...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Fraud detection refers to the attempt to detect illegitimate usage of a communications network. Thre...
The aim of the present paper is a neural network approach to intrusion detection. Misuse detection i...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
With the rapid expansion of computer networks during the past few years, security has become a cruci...
Abstract:- Intrusion Detection is a major focus of research in the security of computer systems and ...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
© International Research Publication House This paper discusses the concept and problem of detecting...
The increasing complexity of today's information technology (IT) together with our dependency upon i...
With an increase in the number of internet users, the number of cyber-attacks happening in organizat...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Many bot-based attacks have been recorded globally in recent years. To carry out their harmful actio...
With the increasing number of computers being connected to the Internet, security of an information ...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Fraud detection refers to the attempt to detect illegitimate usage of a communications network. Thre...