Internet became one of life’s basics in these days. More networks are connected to the Internet every day, which increases the amount of valuable data and the number of resources that can be attacked. Some systems have been designed and developed to secure these data and prevent attacks on resources. Unfortunately, new attacks are being created everyday, which make it hard to design a system that will catch these attacks. The need is not only for preventing the attack but also for detecting such attacks if it happened. Intrusion Detection Systems is built to do this task and complement other security systems. In this paper we build an Intrusion Detection System using a well known unsupervised neural network, namely Kohonen maps. We present ...
Abstract – A system is described for applying hierarchical unsupervised neural networks (self organi...
The duty of securing networks is very difficult due to their size, complexity, diversity and dynamic...
Abstract. This paper proposes a method to detect network intrusions by using the PCASOM (principal c...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Recent Intrusion Detection Systems (IDSs) which are used to monitor real-time attacks on computer an...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a n...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer ...
Network intrusion detection technology based on artificial neural network is an important research d...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
This work is devoted to the problem of Neural Networks as means of Intrusion Detection. We show that...
With the increasing number of computers being connected to the Internet, security of an information ...
The duty of securing networks is very difficult due to their size, complexity, diversity and dynamic...
Abstract – A system is described for applying hierarchical unsupervised neural networks (self organi...
The duty of securing networks is very difficult due to their size, complexity, diversity and dynamic...
Abstract. This paper proposes a method to detect network intrusions by using the PCASOM (principal c...
While many techniques have been explored for detecting intrusive or abnormal behavior on computer sy...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
Recent Intrusion Detection Systems (IDSs) which are used to monitor real-time attacks on computer an...
Neural networks approach is an advanced methodology used for intrusion detection As a type of neural...
According to this thesis title - Intrusion Detection Using Artificial Neural Network is whereby a n...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer ...
Network intrusion detection technology based on artificial neural network is an important research d...
A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural netw...
This work is devoted to the problem of Neural Networks as means of Intrusion Detection. We show that...
With the increasing number of computers being connected to the Internet, security of an information ...
The duty of securing networks is very difficult due to their size, complexity, diversity and dynamic...
Abstract – A system is described for applying hierarchical unsupervised neural networks (self organi...
The duty of securing networks is very difficult due to their size, complexity, diversity and dynamic...
Abstract. This paper proposes a method to detect network intrusions by using the PCASOM (principal c...