2012
DOI: 10.1142/s0129065712500050
|View full text |Cite
|
Sign up to set email alerts
|

A Neural-Visualization Ids for Honeynet Data

Abstract: Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). Unlike previous work, this study proposes an unsupervised neural models that generate an intuitive visualization of the captured traffic, rather than network statistics. These snapshots of network events are immensely useful for security personnel that monitor network behavior. The system i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
2
1

Relationship

5
4

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 52 publications
0
17
0
Order By: Relevance
“…Decisions oriented towards increasing entrepreneurial intention and its transformation into entrepreneurial action necessarily have to consider the characteristics of the group in line with the suggestions of previous studies [4,[26][27][28]31]. In earlier works, the usefulness of PCA has been shown in multiple fields, ranging from the economic analysis of political risk [76] and in the area of computing [77] to the psychological aspects of entrepreneurship [36]. We contribute by applying this technique to the socio-educational analysis of entrepreneurship.…”
Section: Discussionmentioning
confidence: 74%
“…Decisions oriented towards increasing entrepreneurial intention and its transformation into entrepreneurial action necessarily have to consider the characteristics of the group in line with the suggestions of previous studies [4,[26][27][28]31]. In earlier works, the usefulness of PCA has been shown in multiple fields, ranging from the economic analysis of political risk [76] and in the area of computing [77] to the psychological aspects of entrepreneurship [36]. We contribute by applying this technique to the socio-educational analysis of entrepreneurship.…”
Section: Discussionmentioning
confidence: 74%
“…In the case of [24], several projectionist algorithms, such as PCA, CMLHL, CCA, and SOM network, have been applied to monitor the traffic of the Euskalert network (Honeynet data) [25], to discover behaviour and strategies indicative of an attack. In [26], the same techniques have been applied to GICAP-IDS and DARPA datasets [27], and their performance has been measured according to different variables, such as data volume, system dynamics and network traffic diversity, including first-time attacks (0-day).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The active segments are filtered into the respective bands with pass-band spectral range of mu (8)(9)(10)(11)(12) and beta (14-28 Hz) rhythms using a Butterworth band-pass filter. The powers of specific spectral bands are calculated using the variance of filtered data.…”
Section: Spectral Power and Asymmetry Ratiomentioning
confidence: 99%