Network security monitoring using machine learning algorithms is a topic that has been well researched and found to be difficult to use. We propose to use a specific approach in restricted IP network environments and leverage the network state information and information from individual connections for increased level of sensitivity. The approach is meant for use in restricted IP networks which exhibit a level of determinism that enables the use of machine learning approach. In this work we use algorithm called Self-Organizing Maps. We introduce an implementation of self-organizing maps engine built on top of the Bro network security monitor. An implemented selection of initial features for the Self-Organizing Maps is provided and a sample ...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...
Machine learning models have long be proposed to detect the presence of unauthorized activity within...
Network security monitoring using machine learning algorithms is a topic that has been well research...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Abstract Industrial control system (ICS) networks used to be isolated environments, typically separ...
Network security monitoring in ICS, or SCADA, networks provides opportunities and corresponding chal...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
4Traffic monitoring and anomaly detection are essential activities for computer network management, ...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...
Machine learning models have long be proposed to detect the presence of unauthorized activity within...
Network security monitoring using machine learning algorithms is a topic that has been well research...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Abstract Industrial control system (ICS) networks used to be isolated environments, typically separ...
Network security monitoring in ICS, or SCADA, networks provides opportunities and corresponding chal...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
4Traffic monitoring and anomaly detection are essential activities for computer network management, ...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...
Machine learning models have long be proposed to detect the presence of unauthorized activity within...