Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy
DOI: 10.1109/risp.1992.213257
|View full text |Cite
|
Sign up to set email alerts
|

A neural network component for an intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
145
0
2

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 300 publications
(156 citation statements)
references
References 4 publications
0
145
0
2
Order By: Relevance
“…The area of intrusion detection has seen synthesis of concepts and techniques from a variety of disciplines, including expert systems [1,17], artificial neural networks [6], data mining [14], and static analysis [22]. A diverse collection of tools based on these various approaches have been deployed and tested [2,7].…”
Section: Background and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…The area of intrusion detection has seen synthesis of concepts and techniques from a variety of disciplines, including expert systems [1,17], artificial neural networks [6], data mining [14], and static analysis [22]. A diverse collection of tools based on these various approaches have been deployed and tested [2,7].…”
Section: Background and Motivationmentioning
confidence: 99%
“…Other approaches in this category include that of time-based inductive generalization [21], artificial neural networks [6], and data-mining [14]. In time-based inductive generalization, the system behavior is modeled as a set of rules that are dynamically modified during the learning phase depending on how the predictions of the rules match with the observed system behavior.…”
Section: Background and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Several attempts have been made to apply Neural Architectures (such as SelfOrganising Maps [5], [6] Multilayer Perceptron [7], Radial Basis Function Networks [8]) to the field of network security [9], [10]. Most of them have focused on a classificatory approach to the intrusion detection task.…”
Section: Unsupervised Neural Projection Modelsmentioning
confidence: 99%
“…A good example is intrusion detection, which has been used to protect computer systems as a first line of defense. Next generation Intrusion Detection Expert Systems (NIDES) represents an IDS based on statistics that measures the similarity between a subject's long term and short term behaviours [8]. In [9] S.Chebrolu applied Bayesian Networks (BN) and Classification and Regression Trees (CART) approaches in fixed networks to model Intrusion Detection Systems (IDS) with high accuracies of detecting certain intrusions.…”
Section: Introductionmentioning
confidence: 99%