2018 6th International Symposium on Digital Forensic and Security (ISDFS) 2018
DOI: 10.1109/isdfs.2018.8355327
|View full text |Cite
|
Sign up to set email alerts
|

Neural network based intrusion detection systems with different training functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 58 publications
(16 citation statements)
references
References 12 publications
0
15
0
1
Order By: Relevance
“…KDD Cup99 was created in 1998 by DARPA to detect anomaly network traffic and was used in the 1999 KDD Cup Challenge to test IDSs [16], [17]. In its construction, nine weeks of LAN raw data which results in a TCP dump are used.…”
Section: A Kdd Cup99mentioning
confidence: 99%
“…KDD Cup99 was created in 1998 by DARPA to detect anomaly network traffic and was used in the 1999 KDD Cup Challenge to test IDSs [16], [17]. In its construction, nine weeks of LAN raw data which results in a TCP dump are used.…”
Section: A Kdd Cup99mentioning
confidence: 99%
“…Some researchers also attempt to use the Genetic Algorithm (GA), but it was found that Immune algorithms were more effective than GA to Intrusion Detection [84]- [86]. Nonetheless, several studies have used the Neural net over the years [87]- [89]. For instance, in 2018, [89]…”
Section: E Intrusion Detectionmentioning
confidence: 99%
“…Besides, in intrusion detection systems, only a few number of security alarms should be detected and handled [23]- [27].…”
Section: A Importance Of Rare Events With Small Probabilitymentioning
confidence: 99%