The accurate detection of attacks in ad hoc computer networks is made significantly more difficult if the components of the attack sequence are distributed throughout the network data stream. Since current approaches to detecting network intrusions rely on associating individual network actions the temporal distribution of an attack throughout a network makes it extremely difficult to accurately identify the intrusion. This paper describes an approach to detecting temporally distributed attacks based on a modified Hierarchical Quilted Self-Organizing Map (HQSOM). The HQSOM approach emulates some aspects of biological neural networks by distributing the reasoning capability throughout a hierarchical structure. The approach described here com...
This paper describes the initial results of a research program that is designed to enhance the secur...
Computer network attacks seek to achieve one or more objectives against the targeted system. The att...
Adaptive techniques based on machine learning and data mining are gaining relevance in self-manageme...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Abstract – A system is described for applying hierarchical unsupervised neural networks (self organi...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Mobile ad hoc networks continue to be a difficult environment for effective intrusion detection. In ...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
A lightweight, low-computation, distributed intrusion detection scheme termed the distributed hierar...
This paper describes the latest results of a research program that is designed to enhance the securi...
Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in...
This paper describes the latest results of a research program that is designed to enhance the securi...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Adaptive techniques based on machine learning and data mining are gaining relevance in self-manageme...
Network intrusion detection technology based on artificial neural network is an important research d...
This paper describes the initial results of a research program that is designed to enhance the secur...
Computer network attacks seek to achieve one or more objectives against the targeted system. The att...
Adaptive techniques based on machine learning and data mining are gaining relevance in self-manageme...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Abstract – A system is described for applying hierarchical unsupervised neural networks (self organi...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Mobile ad hoc networks continue to be a difficult environment for effective intrusion detection. In ...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
A lightweight, low-computation, distributed intrusion detection scheme termed the distributed hierar...
This paper describes the latest results of a research program that is designed to enhance the securi...
Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in...
This paper describes the latest results of a research program that is designed to enhance the securi...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Adaptive techniques based on machine learning and data mining are gaining relevance in self-manageme...
Network intrusion detection technology based on artificial neural network is an important research d...
This paper describes the initial results of a research program that is designed to enhance the secur...
Computer network attacks seek to achieve one or more objectives against the targeted system. The att...
Adaptive techniques based on machine learning and data mining are gaining relevance in self-manageme...