2012 IEEE 16th International Conference on Intelligent Engineering Systems (INES) 2012
DOI: 10.1109/ines.2012.6249817
|View full text |Cite
|
Sign up to set email alerts
|

Distributed intrusion detection system using self organizing map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Various machine learning techniques were implemented to enhance progress in IDS and an explicit discussion of a survey is given in References . IDS was developed using neural network and multilayer perceptron techniques and an IDS using self‐organizing map (unsupervised learning) was also developed . Using artificial neural network an advanced IDS system using the anomaly detection technique was developed, and by using similar techniques, different datasets IDS were developed in Reference .…”
Section: Benign Outliersmentioning
confidence: 99%
See 1 more Smart Citation
“…Various machine learning techniques were implemented to enhance progress in IDS and an explicit discussion of a survey is given in References . IDS was developed using neural network and multilayer perceptron techniques and an IDS using self‐organizing map (unsupervised learning) was also developed . Using artificial neural network an advanced IDS system using the anomaly detection technique was developed, and by using similar techniques, different datasets IDS were developed in Reference .…”
Section: Benign Outliersmentioning
confidence: 99%
“…Different data types and features related with in NSL-KDD data set ,6,8,9,10,11,13,16,17,18,19,20,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41 …”
mentioning
confidence: 99%
“…Liberios Vokorokos et al present an intrusion detection system and design architecture of intrusion detection based on neural network SOM referred in [6]. Here a core of the designed architecture represents the neural network Self Organizing Map which classifies the monitored user behavior and also determines the possible intrusion of the monitored computer system.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…The idea of using the state of a process to do intrusion detection is proposed in [4]. The authors train a neural network for monitoring the information related to a user's activities -user activity times, user login hosts, user foreign hosts, command set, CPU usage and memory usage patterns.…”
Section: Related Workmentioning
confidence: 99%