Application of artificial neural network in detection of DOS attacks

I Ahmad, AB Abdullah, AS Alghamdi - Proceedings of the 2nd …, 2009 - dl.acm.org
A solo attack may cause a big loss in computer and network systems, its prevention is,
therefore, very inevitable. Precise detection is very important to prevent such losses. Such …

Using a recurrent neural network and restricted Boltzmann machines for malicious traffic detection

C Li, J Wang, X Ye - NeuroQuantology, 2018 - search.proquest.com
In the studies of intrusion detection/prevention systems (IDS/IPS) and network security
situational awareness, malicious traffic detection has been given significantly more attention …

Application of artificial neural network in detection of probing attacks

I Ahmad, AB Abdullah… - 2009 IEEE Symposium on …, 2009 - ieeexplore.ieee.org
The prevention of any type of cyber attack is indispensable because a single attack may
break the security of computer and network systems. The hindrance of such attacks is …

Anomaly detection in wireless sensor networks using self-organizing map and wavelets

S Siripanadorn, W Hattagam… - Proceedings of the 10th …, 2010 - dl.acm.org
Wireless Sensor Networks (WSNs) have been applied in agriculture monitoring to monitor
and collect various physical attributes within a specific area. It is important to detect data …

Security audit compliance for cloud computing

F Doelitzscher - 2014 - pearl.plymouth.ac.uk
Cloud computing has grown largely over the past three years and is widely popular amongst
today's IT landscape. In a comparative study between 250 IT decision makers of UK …

[PDF][PDF] The effect of training set size for the performance of neural networks of classification

H Sug - WSEAS Trans Comput, 2010 - wseas.us
Even though multilayer perceptrons and radial basis function networks belong to the class of
artificial neural networks and they are used for similar tasks, they have very different …

Evaluation of deep learning methods efficiency for malicious and benign system calls classification on the AWSCTD

D Čeponis, N Goranin - Security and Communication Networks, 2019 - Wiley Online Library
The increasing amount of malware and cyberattacks on a host level increases the need for a
reliable anomaly‐based host IDS (HIDS) that would be able to deal with zero‐day attacks …

[PDF][PDF] Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems

I Ahmad, MA Ansari, S Mohsin - Proceedings of the 7th WSEAS …, 2008 - researchgate.net
In this paper a topology of neural network intrusion detection system is proposed on which
different backpropagation algorithms are benchmarked. The proposed methodology uses …

Neural network ensembles design with self-configuring genetic programming algorithm for solving computer security problems

E Semenkin, M Semenkina, I Panfilov - … CISIS'12-ICEUTE´ 12-SOCO´ 12 …, 2013 - Springer
Artificial neural networks based ensembles are used for solving the computer security
problems. Ensemble members and the ensembling method are generated automatically …

Remote to Local attack detection using supervised neural network

I Ahmad, AB Abdullah… - … Conference for Internet …, 2010 - ieeexplore.ieee.org
In order to determine Remote to Local (R2L) attack, an intrusion detection technique based
on artificial neural network is presented. This technique uses sampled dataset from …