The prevention of any type of cyber attack is indispensable because a single attack may break the security of computer and network systems. The hindrance of such attacks is entirely dependent on their detection. The detection is a major part of any security tool such as intrusion detection system (IDS), intrusion prevention system (IPS), adaptive security alliance (ASA), check points and firewalls. Consequently, in this paper, we are contemplating the feasibility of an approach to probing attacks that are the basis of others attacks in computer network systems. Our approach adopts a supervised neural network phenomenon that is majorly used for detecting security attacks. The proposed system takes into account multiple layered perceptron (ML...
This work is devoted to the problem of Neural Networks as means of Intrusion Detection. We show that...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
Nowadays security concerns of computing devices are growing significantly. This is due to ever incre...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
© International Research Publication House This paper discusses the concept and problem of detecting...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Nowadays computer and network security has become a major cause of concern for experts community, du...
Computer network attacks seek to achieve one or more objectives against the targeted system. The att...
Purpose. Currently, there appear more often the reports of penetration into computer networks and at...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
Due to the expansion of high-speed Internet access, the need for secure and reliable networks has be...
This work is devoted to the problem of Neural Networks as means of Intrusion Detection. We show that...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
Nowadays security concerns of computing devices are growing significantly. This is due to ever incre...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
© International Research Publication House This paper discusses the concept and problem of detecting...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Nowadays computer and network security has become a major cause of concern for experts community, du...
Computer network attacks seek to achieve one or more objectives against the targeted system. The att...
Purpose. Currently, there appear more often the reports of penetration into computer networks and at...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
Due to the expansion of high-speed Internet access, the need for secure and reliable networks has be...
This work is devoted to the problem of Neural Networks as means of Intrusion Detection. We show that...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
Nowadays security concerns of computing devices are growing significantly. This is due to ever incre...