The growth of the Internet and consequently, the number of interconnected computers through a shared medium, has exposed a lot of relevant information to intruders and attackers. Firewalls aim to detect violations to a predefined rule set and usually block potentially dangerous incoming traffic. However, with the evolution of the attack techniques, it is more difficult to distinguish anomalies from the normal traffic. Different intrusion detection approaches have been proposed, including the use of artificial intelligence techniques such as neural networks. In this paper, we present a network anomaly detection technique based on Probabilistic Self-Organizing Maps (PSOM) to differentiate between normal and anomalous traffic. The detection ca...
Because of the increased popularity and fast expansion of the Internet as well as Internet of things...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
Recently data mining methods have gained importance in addressing network security issues, including...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer ...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
Abstract—Recently, research on intrusion detection in computer systems has received much attention t...
Because of the increased popularity and fast expansion of the Internet as well as Internet of things...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
Recently data mining methods have gained importance in addressing network security issues, including...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer ...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
Abstract—Recently, research on intrusion detection in computer systems has received much attention t...
Because of the increased popularity and fast expansion of the Internet as well as Internet of things...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
Recently data mining methods have gained importance in addressing network security issues, including...