[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICNC.2008.900guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Network Intrusion Detection System Using Neural Networks

Published: 18 October 2008 Publication History

Abstract

This paper presents a neural network-based intrusion detection method for the internet-based attacks on a computer network. Intrusion detection systems (IDS) have been created to predict and thwart current and future attacks. Neural networks are used to identify and predict unusual activities in the system. In particular, feedforward neural networks with the back propagation training algorithm were employed in this study. Training and testing data were obtained from the Defense Advanced Research Projects Agency (DARPA) intrusion detection evaluation data sets. The experimental results on real-data showed promising results on detection intrusion systems using neural networks.

Cited By

View all
  • (2024)E-SDNN: encoder-stacked deep neural networks for DDOS attack detectionNeural Computing and Applications10.1007/s00521-024-09622-036:18(10431-10443)Online publication date: 1-Jun-2024
  • (2019)Intelligent intrusion detection techniques for secure communications in wireless networksInternational Journal of Advanced Intelligence Paradigms10.5555/3302557.330256912:1-2(134-146)Online publication date: 1-Jan-2019
  • (2017)Machine Learning Approach for Detection of nonTor TrafficProceedings of the 12th International Conference on Availability, Reliability and Security10.1145/3098954.3106068(1-6)Online publication date: 29-Aug-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICNC '08: Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 05
October 2008
647 pages
ISBN:9780769533049

Publisher

IEEE Computer Society

United States

Publication History

Published: 18 October 2008

Author Tag

  1. Intrusion detection, Neural networks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)E-SDNN: encoder-stacked deep neural networks for DDOS attack detectionNeural Computing and Applications10.1007/s00521-024-09622-036:18(10431-10443)Online publication date: 1-Jun-2024
  • (2019)Intelligent intrusion detection techniques for secure communications in wireless networksInternational Journal of Advanced Intelligence Paradigms10.5555/3302557.330256912:1-2(134-146)Online publication date: 1-Jan-2019
  • (2017)Machine Learning Approach for Detection of nonTor TrafficProceedings of the 12th International Conference on Availability, Reliability and Security10.1145/3098954.3106068(1-6)Online publication date: 29-Aug-2017
  • (2017)Contextual information fusion for intrusion detectionKnowledge and Information Systems10.1007/s10115-017-1027-352:3(563-619)Online publication date: 1-Sep-2017
  • (2016)Intrusion detection systems and techniquesInternational Journal of Critical Computer-Based Systems10.1504/IJCCBS.2016.0790776:3(173-190)Online publication date: 1-Jan-2016
  • (2012)Decision tree based light weight intrusion detection using a wrapper approachExpert Systems with Applications: An International Journal10.1016/j.eswa.2011.06.01339:1(129-141)Online publication date: 1-Jan-2012
  • (2011)Security alert correlation using growing neural gasProceedings of the 4th international conference on Computational intelligence in security for information systems10.5555/2023430.2023442(76-83)Online publication date: 8-Jun-2011
  • (2010)Harnessing ANN for a secure environmentProceedings of the 7th international conference on Advances in Neural Networks - Volume Part II10.1007/978-3-642-13318-3_67(540-547)Online publication date: 6-Jun-2010

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media