Intrusion Detection Systems (IDS's) monitor the traffic in computer networks for detecting suspect activities. Connectionist techniques can support the development of IDS's by modeling 'normal' traffic. This paper presents the application of some unsupervised neural methods to a packet dataset for the first time. This work considers three unsupervised neural methods, namely, Vector Quantization (VQ), Self-Organizing Maps (SOM) and Auto-Associative Back-Propagation (AABP) networks. The former paradigm proves quite powerful in supporting the basic space-spanning mechanism to sift normal traffic from anomalous traffic. The SOM attains quite acceptable results in dealing with some anomalies while it fails in dealing with some others. The AABP m...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
This work describes ongoing multidisciplinary research which aims to analyse and to apply connection...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Intrusion Detection Systems (IDS’s) monitor the traffic in computer networks for detecting suspect a...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Intrusion Detection Systems (IDS’s) are essential components in a network communication infrastructu...
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile ...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
In this paper, we review a visual approach and propose it for analysing computer-network activity, w...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
This work describes ongoing multidisciplinary research which aims to analyse and to apply connection...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...
Intrusion Detection Systems (IDS’s) monitor the traffic in computer networks for detecting suspect a...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
Intrusion Detection Systems (IDS’s) are essential components in a network communication infrastructu...
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting ano...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
Unsupervised projection approaches can support Intrusion Detection Systems for computer network secu...
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile ...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
In this paper, we review a visual approach and propose it for analysing computer-network activity, w...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
This work describes ongoing multidisciplinary research which aims to analyse and to apply connection...
Abstract. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. We have co...