2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies 2014
DOI: 10.1109/icaccct.2014.7019145
|View full text |Cite
|
Sign up to set email alerts
|

Increasing performance Of intrusion detection system using neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…Intrusion is the act of intruding or of entering into a place or virtual place without proper permission [1] [2]. For System security and confidentiality intrusion detection plays an important role.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Intrusion is the act of intruding or of entering into a place or virtual place without proper permission [1] [2]. For System security and confidentiality intrusion detection plays an important role.…”
Section: Introductionmentioning
confidence: 99%
“…Hackers can pass malicious traffic through ports that are commonly left open by system such as SMTP, HTTP etc. So the need for sophisticated IDS arises [2]. Based on the method of detection used IDSs can be classified as signature based or misuse based IDSs in which known attacks can be classified easily, it search network traffic for malicious packet.…”
Section: Introductionmentioning
confidence: 99%
“…The paper on Artificial network already said that the IDE should be depend on the cumulative data which can we collect at the different host of networks gather to one placed or we can shared data between different host might have taking advance futuristic approach given to the system by making analysis of different data set available with the system. NSL KDD dataset have most of the solutions [6], [7], [8] For more detailed analysis of the KDD Cup 1999, see [9].…”
Section: Related Workmentioning
confidence: 99%
“…For example, in [12,13] the authors used support vector machines (SVM) to detect anomalies using KDD dataset [14]. In [15], the authors utilized artificial neural networks to build IDS models for anomaly detection using the same dataset. In [16], the author used cascaded classifiers to detect and classify anomalies in KDD dataset even if such anomalies were unequally distributed.…”
Section: A Related Workmentioning
confidence: 99%