Computational and Ambient Intelligence
DOI: 10.1007/978-3-540-73007-1_138
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Neural Projection Techniques Applied to Intrusion Detection Systems

Abstract: Abstract. This paper reviews one nonlinear and two linear projection architectures, in the context of a comparative study, which are used as either alternative or complementary tools in the identification and analysis of anomalous situations by Intrusion Detection Systems (IDSs). Three neural projection models are empirically compared, using real traffic data sets in an IDS framework. The specific multivariate data analysis techniques that drive these models are able to identify different factors or components… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The effectiveness of MOVICAB-IDS in facing some anomalous situations has been widely demonstrated in previous works [10], [15], [16]. The projections obtained [by CMLHL overcome that obtained by Principal Component Analysis (PCA) [10], Maximum Likelihood Hebbian Learning [28] and Auto Associative Back Propagation Networks [28]. Figures 4 and 5 show a comparison of projections obtained by CMLHL ( Fig.…”
Section: Results Conclusion and Future Workmentioning
confidence: 72%
“…The effectiveness of MOVICAB-IDS in facing some anomalous situations has been widely demonstrated in previous works [10], [15], [16]. The projections obtained [by CMLHL overcome that obtained by Principal Component Analysis (PCA) [10], Maximum Likelihood Hebbian Learning [28] and Auto Associative Back Propagation Networks [28]. Figures 4 and 5 show a comparison of projections obtained by CMLHL ( Fig.…”
Section: Results Conclusion and Future Workmentioning
confidence: 72%
“…The reason for these difficulties is the inconsistency in the verification studies and in the presentation of obtained results. In practice, various reference data sets are used, each differing in size and type of data (Greenberg 1988;Kdd cup 1999;Lane 1999), user's command line calls, system calls (Borah et al 2011;Estrada et al 2009) or network traffic data (Corchado et al 2005;Herrero et al 2007). Finally, authors' own data bases, which are not publicly available, are frequently used (Sodiya et al 2011;Wespi et al 1999).…”
Section: Critical Remarksmentioning
confidence: 99%
“…To probe the effectiveness of the chosen projection model (See Section 4.3), it has been compared with other projection methods for data visualization, such as Principal Component Analysis (PCA) [17] and MLHL [35] as detailed in Section 6.1.…”
Section: <Figure 4 Goes Here>mentioning
confidence: 99%