Intrusion detection and classification of attacks in high-level network protocols using Recurrent Neural Networks. Alarcon-Aquino, V., Oropeza-Clavel, C., A., Rodriguez-Asomoza, J., Starostenko, O., & Rosas-Romero, R. In Novel Algorithms and Techniques in Telecommunications and Networking, pages 129-134, 2010. Website doi abstract bibtex This paper presents an application-based model for classifying and identifying attacks in a communications network and therefore guarantees its safety from HTTP protocol-based malicious commands. The proposed model is based on a recurrent neural network architecture and it is therefore suitable to work online and for analyzing non-linear patterns in real time to self-adjust to changes in its input environment. Three different neural network-based systems have been modelled and simulated for comparison purposes in terms of overall performance: a Feed-forward Neural Network, an Elman Network, and a Recurrent Neural Network. Simulation results show that the latter possesses a greater capacity than either of the others for the correct identification and classification of HTTP attacks, and it also reaches a result at a great speed, its somewhat taxing computing requirements notwithstanding. © 2010 Springer Science+Business Media B.V.
@inproceedings{
title = {Intrusion detection and classification of attacks in high-level network protocols using Recurrent Neural Networks},
type = {inproceedings},
year = {2010},
pages = {129-134},
websites = {https://www.researchgate.net/publication/221231694_Intrusion_Detection_and_Classification_of_Attacks_in_High-Level_Network_Protocols_Using_Recurrent_Neural_Networks},
id = {3f66b5e1-c82c-3c99-ad7b-d0f7d8212f9e},
created = {2022-08-29T17:43:08.911Z},
file_attached = {false},
profile_id = {940dd160-7d67-3a5f-b9f8-935da0571367},
group_id = {92fccab2-8d44-33bc-b301-7b94bb18523c},
last_modified = {2022-08-29T17:43:08.911Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
private_publication = {false},
abstract = {This paper presents an application-based model for classifying and identifying attacks in a communications network and therefore guarantees its safety from HTTP protocol-based malicious commands. The proposed model is based on a recurrent neural network architecture and it is therefore suitable to work online and for analyzing non-linear patterns in real time to self-adjust to changes in its input environment. Three different neural network-based systems have been modelled and simulated for comparison purposes in terms of overall performance: a Feed-forward Neural Network, an Elman Network, and a Recurrent Neural Network. Simulation results show that the latter possesses a greater capacity than either of the others for the correct identification and classification of HTTP attacks, and it also reaches a result at a great speed, its somewhat taxing computing requirements notwithstanding. © 2010 Springer Science+Business Media B.V.},
bibtype = {inproceedings},
author = {Alarcon-Aquino, Vicente and Oropeza-Clavel, Carlos A. and Rodriguez-Asomoza, Jorge and Starostenko, Oleg and Rosas-Romero, Roberto},
doi = {10.1007/978-90-481-3662-9-21},
booktitle = {Novel Algorithms and Techniques in Telecommunications and Networking}
}
Downloads: 0
{"_id":"rtLGEro7CtraTJ9A3","bibbaseid":"alarconaquino-oropezaclavel-rodriguezasomoza-starostenko-rosasromero-intrusiondetectionandclassificationofattacksinhighlevelnetworkprotocolsusingrecurrentneuralnetworks-2010","downloads":0,"creationDate":"2018-11-16T03:10:01.185Z","title":"Intrusion detection and classification of attacks in high-level network protocols using Recurrent Neural Networks","author_short":["Alarcon-Aquino, V.","Oropeza-Clavel, C., A.","Rodriguez-Asomoza, J.","Starostenko, O.","Rosas-Romero, R."],"year":2010,"bibtype":"inproceedings","biburl":"https://bibbase.org/service/mendeley/940dd160-7d67-3a5f-b9f8-935da0571367","bibdata":{"title":"Intrusion detection and classification of attacks in high-level network protocols using Recurrent Neural Networks","type":"inproceedings","year":"2010","pages":"129-134","websites":"https://www.researchgate.net/publication/221231694_Intrusion_Detection_and_Classification_of_Attacks_in_High-Level_Network_Protocols_Using_Recurrent_Neural_Networks","id":"3f66b5e1-c82c-3c99-ad7b-d0f7d8212f9e","created":"2022-08-29T17:43:08.911Z","file_attached":false,"profile_id":"940dd160-7d67-3a5f-b9f8-935da0571367","group_id":"92fccab2-8d44-33bc-b301-7b94bb18523c","last_modified":"2022-08-29T17:43:08.911Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"private_publication":false,"abstract":"This paper presents an application-based model for classifying and identifying attacks in a communications network and therefore guarantees its safety from HTTP protocol-based malicious commands. The proposed model is based on a recurrent neural network architecture and it is therefore suitable to work online and for analyzing non-linear patterns in real time to self-adjust to changes in its input environment. Three different neural network-based systems have been modelled and simulated for comparison purposes in terms of overall performance: a Feed-forward Neural Network, an Elman Network, and a Recurrent Neural Network. Simulation results show that the latter possesses a greater capacity than either of the others for the correct identification and classification of HTTP attacks, and it also reaches a result at a great speed, its somewhat taxing computing requirements notwithstanding. © 2010 Springer Science+Business Media B.V.","bibtype":"inproceedings","author":"Alarcon-Aquino, Vicente and Oropeza-Clavel, Carlos A. and Rodriguez-Asomoza, Jorge and Starostenko, Oleg and Rosas-Romero, Roberto","doi":"10.1007/978-90-481-3662-9-21","booktitle":"Novel Algorithms and Techniques in Telecommunications and Networking","bibtex":"@inproceedings{\n title = {Intrusion detection and classification of attacks in high-level network protocols using Recurrent Neural Networks},\n type = {inproceedings},\n year = {2010},\n pages = {129-134},\n websites = {https://www.researchgate.net/publication/221231694_Intrusion_Detection_and_Classification_of_Attacks_in_High-Level_Network_Protocols_Using_Recurrent_Neural_Networks},\n id = {3f66b5e1-c82c-3c99-ad7b-d0f7d8212f9e},\n created = {2022-08-29T17:43:08.911Z},\n file_attached = {false},\n profile_id = {940dd160-7d67-3a5f-b9f8-935da0571367},\n group_id = {92fccab2-8d44-33bc-b301-7b94bb18523c},\n last_modified = {2022-08-29T17:43:08.911Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {This paper presents an application-based model for classifying and identifying attacks in a communications network and therefore guarantees its safety from HTTP protocol-based malicious commands. The proposed model is based on a recurrent neural network architecture and it is therefore suitable to work online and for analyzing non-linear patterns in real time to self-adjust to changes in its input environment. Three different neural network-based systems have been modelled and simulated for comparison purposes in terms of overall performance: a Feed-forward Neural Network, an Elman Network, and a Recurrent Neural Network. Simulation results show that the latter possesses a greater capacity than either of the others for the correct identification and classification of HTTP attacks, and it also reaches a result at a great speed, its somewhat taxing computing requirements notwithstanding. © 2010 Springer Science+Business Media B.V.},\n bibtype = {inproceedings},\n author = {Alarcon-Aquino, Vicente and Oropeza-Clavel, Carlos A. and Rodriguez-Asomoza, Jorge and Starostenko, Oleg and Rosas-Romero, Roberto},\n doi = {10.1007/978-90-481-3662-9-21},\n booktitle = {Novel Algorithms and Techniques in Telecommunications and Networking}\n}","author_short":["Alarcon-Aquino, V.","Oropeza-Clavel, C., A.","Rodriguez-Asomoza, J.","Starostenko, O.","Rosas-Romero, R."],"urls":{"Website":"https://www.researchgate.net/publication/221231694_Intrusion_Detection_and_Classification_of_Attacks_in_High-Level_Network_Protocols_Using_Recurrent_Neural_Networks"},"biburl":"https://bibbase.org/service/mendeley/940dd160-7d67-3a5f-b9f8-935da0571367","bibbaseid":"alarconaquino-oropezaclavel-rodriguezasomoza-starostenko-rosasromero-intrusiondetectionandclassificationofattacksinhighlevelnetworkprotocolsusingrecurrentneuralnetworks-2010","role":"author","metadata":{"authorlinks":{}},"downloads":0},"search_terms":["intrusion","detection","classification","attacks","high","level","network","protocols","using","recurrent","neural","networks","alarcon-aquino","oropeza-clavel","rodriguez-asomoza","starostenko","rosas-romero"],"keywords":[],"authorIDs":[],"dataSources":["uTykyhFv6T7J2dX6z","nyWSrx2yzJEsoe49A"]}