메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1337-1342

ANNIDS: Intrusion detection system based on artificial neural network

Author keywords

Hamming distance; Intrusion detection system; Neural network; Packet

Indexed keywords

ARTIFICIAL INTELLIGENCE; ERROR ANALYSIS; KNOWLEDGE BASED SYSTEMS; LOCAL AREA NETWORKS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; NEURAL NETWORKS; REAL TIME SYSTEMS; WIDE AREA NETWORKS;

EID: 1542375986     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (19)

References (12)
  • 1
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W, Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 2000, Vol. 3, No. 4:227-261.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 2
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Ilgun K, Kemmerer R.A, and Porras P.A. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Soft. Eng. 1995. 21(3):181-199.
    • (1995) IEEE Trans. Soft. Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 4
    • 0004118981 scopus 로고
    • The NIDES statistical component: Description and justification
    • Computer Science Laboratory
    • Javits H.S, Valdes A. The NIDES statistical component: Description and justification. Technical Rep. SRI International, Computer Science Laboratory, 1993.
    • (1993) Technical Rep. SRI International
    • Javits, H.S.1    Valdes, A.2
  • 5
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling response to anomalous live disturbances
    • National Institute of Standards and Technology, Galthersburg MD
    • Porras P.A, Neumann P.O. EMERALD: Event monitoring enabling response to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, National Institute of Standards and Technology, Galthersburg, MD, 1997.
    • (1997) Proceedings of the 20th National Information Systems Security Conference
    • Porras, P.A.1    Neumann, P.O.2
  • 6
    • 85017067350 scopus 로고    scopus 로고
    • Real-time protocol analysis for detecting link-state routing protocol
    • Chang H, Wu S.F, and Jou Y.F. Real-time protocol analysis for detecting link-state routing protocol. ACM Trans. Inf. Syst. Secu, 2001, 4(1):1-36.
    • (2001) ACM Trans. Inf. Syst. Secu , vol.4 , Issue.1 , pp. 1-36
    • Chang, H.1    Wu, S.F.2    Jou, Y.F.3
  • 10
    • 0037411435 scopus 로고    scopus 로고
    • The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
    • Joo D, Hong T, and Han I. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors. Expert Systems with Applications, 2003, 25(1):69-75.
    • (2003) Expert Systems with Applications , vol.25 , Issue.1 , pp. 69-75
    • Joo, D.1    Hong, T.2    Han, I.3
  • 11
    • 0025235219 scopus 로고
    • ART3:Hierarchical search using chemical transmitters in self-organizing pattern recognition architectures
    • Carpenter G.A, Grossberg S. ART3:Hierarchical search using chemical transmitters in self-organizing pattern recognition architectures. Neural Networks, 1990, 3(23):129-152.
    • (1990) Neural Networks , vol.3 , Issue.23 , pp. 129-152
    • Carpenter, G.A.1    Grossberg, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.