Mining in a data-flow environment: experience in network intrusion detection
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Anomaly Detection over Noisy Data using Learned Probability Distributions
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
An Eye on Network Intruder-Administrator Shootouts
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map
IJCNN '00 Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00)-Volume 5 - Volume 5
A data mining framework for constructing features and models for intrusion detection systems (computer security, network security)
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Hi-index | 0.00 |
By combining SOMs network and genetic algorithms, a genetic SOM (Self-Organizing Map) clustering algorithm for intrusion detection is proposed in this paper. In our algorithms, genetic algorithm is used to train the synaptic weights of SOMs. Computer experiments show that GSOMC produces good results on small data sets. Some discussions of the number of clusters K and future work is also given.