Purpose. Currently, there appear more often the reports of penetration into computer networks and attacks on the Web-server. Attacks are divided into the following categories: DoS, U2R, R2L, Probe. The purpose of the article is to identify threats in a computer network based on network traffic parameters using neural network technology, which will protect the server. Methodology. The detection of such threats as Back, Buffer_overflow, Quess_password, Ipsweep, Neptune in the computer network is implemented on the basis of analysis and processing of data on the parameters of network connections that use the TCP/IP protocol stack using the 19-1-25-5 neural network configuration in the Fann Explorer program. When simulating the operation of the...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
A method for detecting denial-of-service attacks on web applications based on the use of a multi-lay...
The Internet of things (IoT) network is still in its infancy and has attracted much interest in many...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
© International Research Publication House This paper discusses the concept and problem of detecting...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Abstract. In this paper, we present an approach for detecting and classifying attacks in computer ne...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
Neural network help to determine the network attack such as Denial of Service (DoS), User to Root (U...
In this paper we introduce an intrusion detection system for Denial of Service (DoS) attacks against...
Computer network attacks seek to achieve one or more objectives against the targeted system. The att...
Focus on Deep Neural Network based malicious and normal computer Network Traffic classification. (su...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Distributed denial of service attack classified as a structured attack to deplete server, sourced fr...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
A method for detecting denial-of-service attacks on web applications based on the use of a multi-lay...
The Internet of things (IoT) network is still in its infancy and has attracted much interest in many...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
© International Research Publication House This paper discusses the concept and problem of detecting...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Abstract. In this paper, we present an approach for detecting and classifying attacks in computer ne...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
Neural network help to determine the network attack such as Denial of Service (DoS), User to Root (U...
In this paper we introduce an intrusion detection system for Denial of Service (DoS) attacks against...
Computer network attacks seek to achieve one or more objectives against the targeted system. The att...
Focus on Deep Neural Network based malicious and normal computer Network Traffic classification. (su...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Distributed denial of service attack classified as a structured attack to deplete server, sourced fr...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
A method for detecting denial-of-service attacks on web applications based on the use of a multi-lay...
The Internet of things (IoT) network is still in its infancy and has attracted much interest in many...