Anomaly detection in mobile communication networks using the self-organizing map
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology - VIII Brazilian Symposium on Neural Networks
Detecting anomalous access patterns in relational databases
The VLDB Journal — The International Journal on Very Large Data Bases
Local anomaly detection for mobile network monitoring
Information Sciences: an International Journal
Mechanisms for database intrusion detection and response
Proceedings of the 2nd SIGMOD PhD workshop on Innovative database research
Analysis of Time Series Novelty Detection Strategies for Synthetic and Real Data
Neural Processing Letters
Detection of Database Intrusion Using a Two-Stage Fuzzy System
ISC '09 Proceedings of the 12th International Conference on Information Security
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Intrusion detection in computer networks with neural and fuzzy classifiers
ICANN/ICONIP'03 Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing
Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Detecting compounded anomalous SNMP situations using cooperative unsupervised pattern recognition
ICANN'05 Proceedings of the 15th international conference on Artificial neural networks: formal models and their applications - Volume Part II
IDEAL'05 Proceedings of the 6th international conference on Intelligent Data Engineering and Automated Learning
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part I
A genetic SOM clustering algorithm for intrusion detection
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Two-stage database intrusion detection by combining multiple evidence and belief update
Information Systems Frontiers
Hi-index | 0.00 |
Computer systems are vulnerable to abuse by insiders and to penetration by outsiders. The amount of monitoring data generated in computer networks is enormous. Tools are needed to ease the work of system operators. Anomaly detection attempts to recognize abnormal behavior to detect intrusions. A prototype UNIX Anomaly Detection System has been constructed. The system is host-based and monitors computer network host users. The system contains an automatic anomaly detection component. This component uses a test based on the Self-Organizing Map to test if user behavior is anomalous. Both the test and the application are presented in this paper.