A hierarchical SOM-based intrusion detection system
Engineering Applications of Artificial Intelligence
Network intrusion detection in covariance feature space
Pattern Recognition
IEEE Transactions on Knowledge and Data Engineering
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Processing of massive audit data streams for real-time anomaly intrusion detection
Computer Communications
A New GHSOM Model Applied to Network Security
ICANN '08 Proceedings of the 18th international conference on Artificial Neural Networks, Part I
Traffic Data Preparation for a Hybrid Network IDS
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
Hierarchical Graphs for Data Clustering
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
Adaptive Distributed Intrusion Detection Using Parametric Model
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
Unsupervised active learning based on hierarchical graph-theoretic clustering
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A comparison of neural projection techniques applied to intrusion detection systems
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
Intrusion detection at packet level by unsupervised architectures
IDEAL'07 Proceedings of the 8th international conference on Intelligent data engineering and automated learning
A distribution-based approach to anomaly detection and application to 3G mobile traffic
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Network security using growing hierarchical self-organizing maps
ICANNGA'09 Proceedings of the 9th international conference on Adaptive and natural computing algorithms
A principal components analysis neural gas algorithm for anomalies clustering
WSEAS TRANSACTIONS on SYSTEMS
Distribution-based anomaly detection in 3G mobile networks: from theory to practice
International Journal of Network Management
An effective intrusion detection method using optimal hybrid model of classifiers
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
Classification as clustering: A pareto cooperative-competitive gp approach
Evolutionary Computation
Testing ensembles for intrusion detection: On the identification of mutated network scans
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Decision tree based light weight intrusion detection using a wrapper approach
Expert Systems with Applications: An International Journal
Resource awareness in computational intelligence
International Journal of Advanced Intelligence Paradigms
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Incorporating temporal constraints in the planning task of a hybrid intelligent IDS
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
Advanced probabilistic approach for network intrusion forecasting and detection
Expert Systems with Applications: An International Journal
A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection
Journal of Parallel and Distributed Computing
Evaluation on multivariate correlation analysis based denial-of-service attack detection system
Proceedings of the First International Conference on Security of Internet of Things
Semantic security against web application attacks
Information Sciences: an International Journal
Network Load Predictions Based on Big Data and the Utilization of Self-Organizing Maps
Journal of Network and Systems Management
Hi-index | 0.00 |
A novel multilevel hierarchical Kohonen Net (K-Map) for an intrusion detection system is presented. Each level of the hierarchical map is modeled as a simple winner-take-all K-Map. One significant advantage of this multilevel hierarchical K-Map is its computational efficiency. Unlike other statistical anomaly detection methods such as nearest neighbor approach, K-means clustering or probabilistic analysis that employ distance computation in the feature space to identify the outliers, our approach does not involve costly point-to-point computation in organizing the data into clusters. Another advantage is the reduced network size. We use the classification capability of the K-Map on selected dimensions of data set in detecting anomalies. Randomly selected subsets that contain both attacks and normal records from the KDD Cup 1999 benchmark data are used to train the hierarchical net. We use a confidence measure to label the clusters. Then we use the test set from the same KDD Cup 1999 benchmark to test the hierarchical net. We show that a hierarchical K-Map in which each layer operates on a small subset of the feature space is superior to a single-layer K-Map operating on the whole feature space in detecting a variety of attacks in terms of detection rate as well as false positive rate.