2019
DOI: 10.1007/s00521-019-04363-x
|View full text |Cite
|
Sign up to set email alerts
|

Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 47 publications
(21 citation statements)
references
References 28 publications
0
20
0
Order By: Relevance
“…Flow data is usually large in size, difficult to be processed in real-time, and when processed, it is either destroyed or archived, and is very difficult to be recovered again, because the system's memory is typically very small. The analysis, monitoring, and categorization of the Internet network traffic [2] is one of the most important tasks and characterised as a specialised solution and a valuable tool that can be used not only to effectively deal with the design, management, and monitoring of the critical infrastructure of the system, but also for the monitoring of attacks and the study of cybercrime [3].…”
Section: Introductionmentioning
confidence: 99%
“…Flow data is usually large in size, difficult to be processed in real-time, and when processed, it is either destroyed or archived, and is very difficult to be recovered again, because the system's memory is typically very small. The analysis, monitoring, and categorization of the Internet network traffic [2] is one of the most important tasks and characterised as a specialised solution and a valuable tool that can be used not only to effectively deal with the design, management, and monitoring of the critical infrastructure of the system, but also for the monitoring of attacks and the study of cybercrime [3].…”
Section: Introductionmentioning
confidence: 99%
“…In the FWCN, the competition is used in every training process of the activation function to find the transformation of normal code to a malicious file. In the implementation, three nets, including Maxnet, Mexican hat, and Hamming net, are exploited to handle the malicious activity against the normal file and malicious file with the fixed weight to find malware present in the unknown file [13][14][15][16]. One of the competition-based networks with fixed weight is Maxnet.…”
Section: Delineation Of Unsupervised Fixed Weight Competitive Net Learning Used To Analysis the Unknown File Instruction Setsmentioning
confidence: 99%
“…As it happens with the biological neurons, when the dynamics of their cell membrane reaches a particular value, which is called action potential, then the neuron triggers and produces a signal that travels to other neurons, which, in turn, increase or decrease the dynamics of their cell membrane according to this particular signal. The SNNs use peak sequences as mechanisms of internal information presentation, in contrast to the usual continuous variables, while at the same time having equal, if not better, performance in computational cost to the traditional NNs [ 79 , 80 , 81 ].…”
Section: Architecturesmentioning
confidence: 99%