State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
Accurately Detecting Source Code of Attacks That Increase Privilege
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
Identifying key features for intrusion detection using neural networks
ICCC '02 Proceedings of the 15th international conference on Computer communication
Distributed multi-intelligent agent framework for detection of stealthy probes
Design and application of hybrid intelligent systems
Mobility-based anomaly detection in cellular mobile networks
Proceedings of the 3rd ACM workshop on Wireless security
A framework of cooperating intrusion detection based on clustering analysis and expert system
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A network intrusion detection system based on the artificial neural networks
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Computer Networks and ISDN Systems
Data warehousing and data mining techniques for intrusion detection systems
Distributed and Parallel Databases
A System Architecture for Computer Intrusion Detection
Information-Knowledge-Systems Management
Hybrid multi-agent framework for detection of stealthy probes
Applied Soft Computing
Adaptive anomaly detection with evolving connectionist systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Trace anomalies as precursors of field failures: an empirical study
Empirical Software Engineering
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
A NetFlow based flow analysis and monitoring system in enterprise networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and implementation of a misused intrusion detection system using autonomous and mobile agents
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Sensing Attacks in Computers Networks with Hidden Markov Models
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
ICCBR '07 Proceedings of the 7th international conference on Case-Based Reasoning: Case-Based Reasoning Research and Development
Intrusion detection using fuzzy association rules
Applied Soft Computing
A hybrid intrusion detection system design for computer network security
Computers and Electrical Engineering
Ensemble of classifiers for detecting network intrusion
Proceedings of the International Conference on Advances in Computing, Communication and Control
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Neural networks-based detection of stepping-stone intrusion
Expert Systems with Applications: An International Journal
Computer Networks: The International Journal of Computer and Telecommunications Networking
A modular multiple classifier system for the detection of intrusions in computer networks
MCS'03 Proceedings of the 4th international conference on Multiple classifier systems
A comparison of neural projection techniques applied to intrusion detection systems
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
Community epidemic detection using time-correlated anomalies
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
Expert Systems with Applications: An International Journal
Intrusion detection using neural based hybrid classification methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting compounded anomalous SNMP situations using cooperative unsupervised pattern recognition
ICANN'05 Proceedings of the 15th international conference on Artificial neural networks: formal models and their applications - Volume Part II
Mutual information-based feature selection for intrusion detection systems
Journal of Network and Computer Applications
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
An efficient SVM-Based method to detect malicious attacks for web servers
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A neural network model for detection systems based on data mining and false errors
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Incorporating data mining tools into a new Hybrid-IDS to detect known and unknown attacks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
CIPS: coordinated intrusion prevention system
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
A novel intrusions detection method based on HMM embedded neural network
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part I
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part I
METAL – a tool for extracting attack manifestations
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Feature selection and intrusion detection using hybrid flexible neural tree
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
ICAISC'06 Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing
Research: Model for network behaviour under viral attack
Computer Communications
Review: Artificial intelligence approaches to network management: recent advances and a survey
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
Network intrusion detection system: a machine learning approach
Intelligent Decision Technologies
HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Fuzzy particle swarm optimization for intrusion detection
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
Anomaly intrusion detection based on PLS feature extraction and core vector machine
Knowledge-Based Systems
Carat: collaborative energy diagnosis for mobile devices
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
In this paper, we present a possible application of neural networks as a component of an intrusion detection system. Neural network algorithms are emerging nowadays as a new artificial intelligence technique that can be applied to real-life problems. We present an approach of user behavior modeling that takes advantage of the properties of neural algorithms and display results obtained on preliminary testing of our approach.