Views for Multilevel Database Security
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Learning internal representations by error propagation
Parallel distributed processing: explorations in the microstructure of cognition, vol. 1
Fuzzy logic, neural networks, and soft computing
Communications of the ACM
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
Fuzzy and Neural Approaches in Engineering
Fuzzy and Neural Approaches in Engineering
Artificial Intelligence: A Guide to Intelligent Systems
Artificial Intelligence: A Guide to Intelligent Systems
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions
ICDM '01 Proceedings of the 2001 IEEE International Conference on Data Mining
Intrusion Detection Applying Machine Learning to Solaris Audit Data
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Detecting Anomalous and Unknown Intrusions Against Programs
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
Incorporating soft computing techniques into a probabilistic intrusion detection system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Training a neural-network based intrusion detector to recognize novel attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Network intrusion and fault detection: a statistical anomaly approach
IEEE Communications Magazine
Using genetic feature selection for improving cyber attack detection rate
ACST'07 Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology
Automated diagnosis of sewer pipe defects based on machine learning approaches
Expert Systems with Applications: An International Journal
Segmenting ideal morphologies of sewer pipe defects on CCTV images for automated diagnosis
Expert Systems with Applications: An International Journal
Proposing a hybrid-intelligent framework to secure e-government web applications
Proceedings of the 2nd international conference on Theory and practice of electronic governance
Detecting network intrusions using signal processing with query-based sampling filter
EURASIP Journal on Advances in Signal Processing - Special issue on signal processing applications in network intrusion detection systems
Information fusion for computer security: State of the art and open issues
Information Fusion
Fast Learning Neural Network Intrusion Detection System
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
A triangle area based nearest neighbors approach to intrusion detection
Pattern Recognition
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Features selection for intrusion detection systems based on support vector machines
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A comparison of neural projection techniques applied to intrusion detection systems
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
Feature selection using rough-DPSO in anomaly intrusion detection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Analysis of an evolutionary RBFN design algorithm, CO2RBFN, for imbalanced data sets
Pattern Recognition Letters
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
IWANN'11 Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part I
Testing ensembles for intrusion detection: On the identification of mutated network scans
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Review: Adaptive cruise control look-ahead system for energy management of vehicles
Expert Systems with Applications: An International Journal
A neural model in intrusion detection systems
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
ISNN'10 Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part II
Using attack-specific feature subsets for network intrusion detection
AI'06 Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence
Automatically building datasets of labeled IP traffic traces: A self-training approach
Applied Soft Computing
RT-MOVICAB-IDS: Addressing real-time intrusion detection
Future Generation Computer Systems
The design of polynomial function-based neural network predictors for detection of software defects
Information Sciences: an International Journal
Features selection approaches for intrusion detection systems based on evolution algorithms
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.10 |
Most intrusion detection system (IDS) with a single-level structure can only detect either misuse or anomaly attacks. Some IDSs with multi-level structure or multi-classifier are proposed to detect both attacks, but they are limited in adaptively learning. In this paper, two hierarchical IDS frameworks using Radial Basis Functions (RBF) are proposed. A serial hierarchical IDS (SHIDS) is proposed to identify misuse attack accurately and anomaly attacks adaptively. A parallel hierarchical IDS (PHIDS) is proposed to enhance the SHIDS's functionalities and performance. The experiments show that the two proposed IDSs can detect network intrusions in real-time, train new classifiers for novel intrusions automatically, and modify their structures adaptively after new classifiers are trained.