Adaptive pattern recognition and neural networks
Adaptive pattern recognition and neural networks
Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations
Advances in knowledge discovery and data mining
Advances in knowledge discovery and data mining
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
Advances in Distributed and Parallel Knowledge Discovery
Advances in Distributed and Parallel Knowledge Discovery
Data management and transfer in high-performance computational grid environments
Parallel Computing - Parallel data-intensive algorithms and applications
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
The Grid 2: Blueprint for a New Computing Infrastructure
The Grid 2: Blueprint for a New Computing Infrastructure
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Hi-index | 0.00 |
Scientific disciplines such as life sciences as well as security and business fields depend on Knowledge Discovery because of the increasing amount of data being collected and for the complex analyses that need to be performed on them. New techniques, such as parallel, distributed, and grid-based data mining, are often able to overcome some of the characteristics of current data sources such as their large scale, high dimensionality, heterogeneity, and distributed nature. In several of these data mining applications, neural networks can be successfully applied. Moreover, an approach using neural networks seems to be one of the most promising methods for intrusion detection in a computer system or network security today. In this paper we describe a grid computing data mining approach for an intrusion detection application based on neural networks. Detection is carried out through the analyses of internet traffic generated by users in a network computer system.