Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion detection is investigated. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark data set from the International Knowledge Discovery and Data Mining Tools Competition is employed. Extensive analysis is conducted in order to assess the significance of the features employed, the partitioning of training data and the complexity of the architecture. Contributions that follow from such a holistic evaluation of the SOM include recognizing that (1) best performance is achieved using a two-layer SOM hierarchy, based on all 41-features from the KDD data set. (2) Only 40% of the orig...
A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all netwo...
A novel multilevel hierarchicalKohonen Net (K-Map) for an intrusion detection system is presented. E...
Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-O...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
We have discovered a novel approach of intrusion detection system using an intelligent data classifi...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
Includes bibliographical references (leaves 71-75).A Network Intrusion Detection System (NIDS) is an...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
AbstractProtection from hackers on networks is currently of great importance. Recent examples of vic...
Abstract – A system is described for applying hierarchical unsupervised neural networks (self organi...
The rapid development of internet and network technology followed by malicious threats and attacks o...
A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all netwo...
A novel multilevel hierarchicalKohonen Net (K-Map) for an intrusion detection system is presented. E...
Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-O...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
We have discovered a novel approach of intrusion detection system using an intelligent data classifi...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
Includes bibliographical references (leaves 71-75).A Network Intrusion Detection System (NIDS) is an...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
AbstractProtection from hackers on networks is currently of great importance. Recent examples of vic...
Abstract – A system is described for applying hierarchical unsupervised neural networks (self organi...
The rapid development of internet and network technology followed by malicious threats and attacks o...
A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all netwo...
A novel multilevel hierarchicalKohonen Net (K-Map) for an intrusion detection system is presented. E...
Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-O...