The growth of the Internet and, consequently, the number of interconnected computers, has exposed significant amounts of information to intruders and attackers. Firewalls aim to detect violations according to a predefined rule-set and usually block potentially dangerous incoming traffic. However, with the evolution of attack techniques, it is more difficult to distinguish anomalies from normal traffic. Different detection approaches have been proposed, including the use of machine learning techniques based on neural models such as Self-Organizing Maps (SOMs). In this paper, we present a classification approach that hybridizes statistical techniques and SOM for network anomaly detection. Thus, while Principal Component Analysis (PCA) and Fis...
The main purpose of this paper is to propose a novel soft computing inference engine model for intru...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Most current anomaly Intrusion Detection Systems (IDSs)detect computer network behavior as normal or...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Intrusion Detection Systems (IDS’s) monitor the traffic in computer networks for detecting suspect a...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to th...
Detecting anomalous traffic on the internet has remained an issue of concern for the community of se...
This article applies Machine Learning techniques to solve Intrusion Detection problems within comput...
The main purpose of this paper is to propose a novel soft computing inference engine model for intru...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
The growth of the Internet and, consequently, the number of interconnected computers, has exposed si...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Anomaly detection in user access patterns using artificial neural networks is a novel way of combati...
This article introduces an approach to anomaly intrusion detection based on a combination of supervi...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
Most current anomaly Intrusion Detection Systems (IDSs)detect computer network behavior as normal or...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Intrusion Detection Systems (IDS’s) monitor the traffic in computer networks for detecting suspect a...
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techn...
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to th...
Detecting anomalous traffic on the internet has remained an issue of concern for the community of se...
This article applies Machine Learning techniques to solve Intrusion Detection problems within comput...
The main purpose of this paper is to propose a novel soft computing inference engine model for intru...
Due to the launch of new applications the behavior of internet traffic is changing. Hackers are alwa...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...