2014
DOI: 10.2298/csis130415035a
|View full text |Cite
|
Sign up to set email alerts
|

Flow-based anomaly intrusion detection system using two neural network stages

Abstract: Computer systems and networks suffer due to rapid increase of attacks, and in order to keep them safe from malicious activities or policy violations, there is need for effective security monitoring systems, such as Intrusion Detection Systems (IDS). Many researchers concentrate their efforts on this area using different approaches to build reliable intrusion detection systems. Flow-based intrusion detection systems are one of these approaches that rely on aggregated flow statistics of network… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 97 publications
0
18
0
Order By: Relevance
“…Abuadlla et al in his work [1] deals with issues of attack on a large network. Focus was also on the computer systems where MLP network was used to identify time windows during which the attacks were most likely to happen, all on the basis of significant changes in traffic over time.…”
Section: Application Of Multilayered Perceptrons From the Aspect Of Tmentioning
confidence: 99%
“…Abuadlla et al in his work [1] deals with issues of attack on a large network. Focus was also on the computer systems where MLP network was used to identify time windows during which the attacks were most likely to happen, all on the basis of significant changes in traffic over time.…”
Section: Application Of Multilayered Perceptrons From the Aspect Of Tmentioning
confidence: 99%
“…Abuadlla et al [13] proposed a two-stage intrusion detection and classification method by taking advantage of two separate neural networks for each task. The first stage detects traffic anomalies whereas the next stage classifies the attacks as they occur.…”
Section: Related Workmentioning
confidence: 99%
“…The natural fastness of neural networks in detecting and recognizing attacks has influenced many researchers [7] [10], [11], [ 12], [13], [14], [15], [16] so as to make them get interested in this universal scheme for intrusion detection. The learning processes used for modifying the network's settings used by the researchers are the following:…”
Section: Related Workon Neural Network-basedidsmentioning
confidence: 99%
“…Yousef Abuadlla && all [16] suggested a behavioral IDS based on traffic networks and two levels of neural networks. The first level makes possible the changes within the traffic and checks whether it is an attack or not.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%