Ahmad et al., 2005 - Google Patents

Intrusions detection mechanism by resilient back propagation (RPROP)

Ahmad et al., 2005

View PDF
Document ID
6018348697633995953
Author
Ahmad I
Swati S
Mohsin S
Publication year
Publication venue
European Journal of Scientific Research ISSN

External Links

Snippet

The accurate detection of computer and network system intrusions has always been an elusive aim for system administrator and information security researchers. There are several methods of responding to a network intrusion, but they all require precise identification of the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/06Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
    • G06N3/063Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means

Similar Documents

Publication Publication Date Title
Ahmad et al. Application of artificial neural network in detection of DOS attacks
Haghnegahdar et al. A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection
Zhao et al. A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things
Saied et al. Detection of known and unknown DDoS attacks using Artificial Neural Networks
Cannady Artificial neural networks for misuse detection
Ahmad et al. Application of artificial neural network in detection of probing attacks
Cannady et al. The application of artificial neural networks to misuse detection: initial results
Tran et al. Deep hierarchical reinforcement agents for automated penetration testing
Abou El Houda et al. A mec-based architecture to secure iot applications using federated deep learning
Ahmad et al. Intrusions detection mechanism by resilient back propagation (RPROP)
Sharma et al. Anomaly based network intrusion detection for IoT attacks using convolution neural network
Ateş et al. Clustering based DDoS attack detection using the relationship between packet headers
Vo et al. Apelid: Enhancing real-time intrusion detection with augmented wgan and parallel ensemble learning
Ishitaki et al. A neural network based user identification for Tor networks: Data analysis using Friedman test
Qu et al. An {Input-Agnostic} Hierarchical Deep Learning Framework for Traffic Fingerprinting
van der Valk et al. Learning from a big brother-mimicking neural networks in profiled side-channel analysis
Ahmad et al. Artificial neural network approaches to intrusion detection: a review
Kumar et al. URL Phishing Data Analysis and Detecting Phishing Attacks using Machine Learning in NLP
Bhavani et al. Phishing Websites Detection Using Machine Learning
Ng et al. Dimensionality reduction for denial of service detection problems using RBFNN output sensitivity
Huang et al. Deep learning modeling attack analysis for multiple fpga-based apuf protection structures
Kumar et al. Intrusion detection using artificial neural network with reduced input features
Thanh A novel approach for intrusion detection based on deep belief network
Akinwumi et al. Detection of Distributed Denial of Service (DDoS) attacks using convolutional neural networks
Kumar et al. 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network