2014
DOI: 10.7753/ijcatr0309.1010
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Using Self Organizing Map Algorithms

Abstract: Abstract:With the rapid expansion of computer usage and computer network the security of the computer system has became very important. Every day new kind of attacks are being faced by industries. Many methods have been proposed for the development of intrusion detection system using artificial intelligence technique. In this paper we will have a look at an algorithm based on neural networks that are suitable for Intrusion Detection Systems (IDS). The name of this algorithm is "Self Organizing Maps" (SOM). So … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…This is a very popular solution used by user modelling systems given the exibility and ease of use that this architecture offers, allowing the exchange of information in a structured and effective way. For example, in [3] and [7] the information contained in MIB 2 is analyzed for the detection of DoS (Denial of Service) attacks. Other widely adopted methods or techniques for user data acquisition are the use of operating system log les or tra c ltering systems [8].…”
Section: B Characterization Of Behaviourmentioning
confidence: 99%
“…This is a very popular solution used by user modelling systems given the exibility and ease of use that this architecture offers, allowing the exchange of information in a structured and effective way. For example, in [3] and [7] the information contained in MIB 2 is analyzed for the detection of DoS (Denial of Service) attacks. Other widely adopted methods or techniques for user data acquisition are the use of operating system log les or tra c ltering systems [8].…”
Section: B Characterization Of Behaviourmentioning
confidence: 99%