The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage. For analyzing, the work deploys the Feedforward-Back propagation neural network to act as misuse intrusion detection system. It uses ten types if attacks as example for training and testing the neural network. It explains how the packets are analyzed to extract features. The work shows how selecting the right features, building correct vectors and how correct identification of the training methods with nodes- number in hidden layer of any neural network affecting the accuracy of system. In addition, the work shows how to get values of optimal weigh...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Abstract:- Intrusion Detection is a major focus of research in the security of computer systems and ...
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
In this paper, some of the methods used in the intrusion detection system were described using the n...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Recent research indicates a lot of attempts to create an Intrusion Detection System that is capable ...
According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a n...
This work is devoted to the problem of Neural Networks as means of Intrusion Detection. We show that...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
© International Research Publication House This paper discusses the concept and problem of detecting...
using two methods of identification of attacks: by signatures that are specific defined elements of...
The aim of the present paper is a neural network approach to intrusion detection. Misuse detection i...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Abstract:- Intrusion Detection is a major focus of research in the security of computer systems and ...
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
In this paper, some of the methods used in the intrusion detection system were described using the n...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Recent research indicates a lot of attempts to create an Intrusion Detection System that is capable ...
According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a n...
This work is devoted to the problem of Neural Networks as means of Intrusion Detection. We show that...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
© International Research Publication House This paper discusses the concept and problem of detecting...
using two methods of identification of attacks: by signatures that are specific defined elements of...
The aim of the present paper is a neural network approach to intrusion detection. Misuse detection i...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Abstract:- Intrusion Detection is a major focus of research in the security of computer systems and ...
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...