Unsupervised projection approaches can support Intrusion Detection Systems for computer network security. The involved technologies assist a network manager in detecting anomalies and potential threats by an intuitive display of the progression of network traffic. Projection methods operate as smart compression tools and map raw, high-dimensional traffic data into 2-D or 3-D spaces for subsequent graphical display. The paper compares three projection methods, namely, Cooperative Maximum Likelihood Hebbian Learning, Auto-Associative Back-Propagation networks and Principal Component Analysis. Empirical tests on anomalous situations related to the Simple Network Management Protocol (SNMP) confirm the validity of the projection-based approach. ...
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile ...
MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). T...
There are many security systems to protect information resources, but we are still not free from pos...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
This paper reviews one nonlinear and two linear projection architectures, in the context of a compar...
This paper reviews one nonlinear and two linear projection architectures, in the context of a compar...
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic...
Thework presented in this paper shows the capability of a connectionist model, based on a statistica...
Intrusion Detection Systems (IDS's) monitor the traffic in computer networks for detecting suspect a...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
Intrusion Detection Systems (IDS’s) are essential components in a network communication infrastructu...
This research approaches the anomalous situations detection issue from a pattern recognition point o...
In this paper, we review a visual approach and propose it for analysing computer-network activity, w...
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile ...
MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). T...
There are many security systems to protect information resources, but we are still not free from pos...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
This paper reviews one nonlinear and two linear projection architectures, in the context of a compar...
This paper reviews one nonlinear and two linear projection architectures, in the context of a compar...
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic...
Thework presented in this paper shows the capability of a connectionist model, based on a statistica...
Intrusion Detection Systems (IDS's) monitor the traffic in computer networks for detecting suspect a...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
Intrusion Detection Systems (IDS’s) are essential components in a network communication infrastructu...
This research approaches the anomalous situations detection issue from a pattern recognition point o...
In this paper, we review a visual approach and propose it for analysing computer-network activity, w...
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile ...
MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). T...
There are many security systems to protect information resources, but we are still not free from pos...