期刊文献+

Artificial Neural Network for Misuse Detection 被引量:1

Artificial Neural Network for Misuse Detection
下载PDF
导出
机构地区 National Advanced IPV
出处 《通讯和计算机(中英文版)》 2010年第6期38-48,共11页 Journal of Communication and Computer
关键词 人工神经网络 滥用检测 ELMAN神经网络 入侵检测系统 计算机网络 攻击者 智能方法 网络流量 Intrusion detection system (IDS), artificial neural network (ANN), growing hierarchical self-organizing maps (GHSOM),Jordan-Elman neural networks.
  • 相关文献

参考文献19

  • 1P.T. Tich, C. Longbing, T. Dat, D.N. Cuong, Novel intrusion detection using probabilistic neural network and adaptive boosting, International Journal of Computer Science and Information Security 6 (2009).
  • 2M. Sammany, M. Sharawi, M. EI-Beltagy, I. Saroit, Artificial Neural Networks Architecture for Intrusion Detection Systems and Classification of Attacks, Cairo University, available online at: http://infos2007. fci.cu. edu.eg/Computational%20Intelligence/07177.pdf, 2007,.
  • 3L. Liang-Bin, C. Ray-I, K. Jen-Shiang, Detecting network intrusions using signal processing with query-based sampling filter, EURASIP Journal on Advances in Signal Processing (2009).
  • 4X.W. Shelly, B. Wolfgang, The use of computational intelligence in intrusion detection systems: a review, Applied Soft Computing 10 (2010) 1-35.
  • 5L.I. Yan-Heng, T Da-Xin, W. Ai-Min, Annids: intrusion detection system based on artificial neural network, in:Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi'an, 2003.
  • 6J. Cannady, Artificial neural networks for misuse detection, in: Proceedings of the 1998 National Information Systems Security Conference, Arlington, VA, 1998.
  • 7A. Morteza, J. Rasool, R.S. Hamid, RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks, Computers & Security 25 (2006) 459-468.
  • 8A. Grediaga, F. Ibarra, F. Garcia, B. Ledesma, F. Brotons, Application of Neural Networks in Network Control and Information Security, LNCS, Springer, Heidelberg, 2006, pp. 208-213.
  • 9R.C. Chen, K.F. Cheng, C.F. Hsieh, Using rough set and support vector machine for network intrusion detection, International Journal of Network Security & Its Applications 1 (2009).
  • 10D. Ozgur, T. Murat, A. Emin, C. Kemal, An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert Systems with Applications 29 (2005) 713-722.

同被引文献3

引证文献1

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部