The rapid development of internet and network technology followed by malicious threats and attacks on networks and computers. Intrusion detection system (IDS) was developed to solve that problems. The development of IDS using machine learning is needed for classifying the attacks. One method of the classification is Self-Organizing Map (SOM). SOM able to perform classification and visualization in learning process to gain new knowledge. However, the SOM has less efficient in learning process when applied in Big Data. This study proposes Restricted Growing SOM method with clustering reference vector (RGSOM-CRV) and Parallel RGSOM-CRV to improve SOM efficiency in classification with accuracy consideration to solve Big Data problem. Growing pr...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
Self-Organizing Map (SOM) algorithm as an unsupervised learning method has been applied in anomaly d...
Anomaly detection has always been the focus of researchers and especially, the developments of mobil...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
We have discovered a novel approach of intrusion detection system using an intelligent data classifi...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-O...
Anomaly detection techniques are widely used in a number of applications, such as, computer networks...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Due to the widespread use of the Internet, customer information is vulnerable to computer systems at...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
Self-Organizing Map (SOM) algorithm as an unsupervised learning method has been applied in anomaly d...
Anomaly detection has always been the focus of researchers and especially, the developments of mobil...
Intrusion Detection System (IDS) protects a system by detecting “known ” as well as “unknown ” attac...
We have discovered a novel approach of intrusion detection system using an intelligent data classifi...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
Abstract:- A new approach of anomaly intrusion detection (AID) is proposed in this paper. The Self-O...
Anomaly detection techniques are widely used in a number of applications, such as, computer networks...
Abstract—The growing hierarchical self organizing map (GH-SOM) has been shown to be an effective tec...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
International audienceIt is a well-known problem that intrusion detection systems overload their hum...
Due to the widespread use of the Internet, customer information is vulnerable to computer systems at...
Purely based on a hierarchy of self-organizing feature maps (SOMs), an approach to network intrusion...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse th...
Self-Organizing Map (SOM) algorithm as an unsupervised learning method has been applied in anomaly d...
Anomaly detection has always been the focus of researchers and especially, the developments of mobil...