A neural network component for an intrusion detection system. Debar, H., Becker, M., & Siboni, D. In Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pages 240--250, Oackland, CA, May, 1992. IEEE Computer Society Press. 00552 bibtex: debar1992neural
A neural network component for an intrusion detection system [link]Paper  doi  abstract   bibtex   
In this paper, we present a possible application of neural networks as a component of an intrusion detection system. Neural network algorithms are emerging nowadays as a new artificial intelligence technique that can be applied to real-life problems. We present an approach of user behavior modeling that takes advantage of the properties of neural algorithms and display results obtained on preliminary testing of our approach.
@inproceedings{ debar_neural_1992,
  address = {Oackland, CA},
  title = {A neural network component for an intrusion detection system},
  isbn = {0-8186-2825-1},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=213257},
  doi = {10.1109/RISP.1992.213257},
  abstract = {In this paper, we present a possible application of neural networks as a component of an intrusion detection system. Neural network algorithms are emerging nowadays as a new artificial intelligence technique that can be applied to real-life problems. We present an approach of user behavior modeling that takes advantage of the properties of neural algorithms and display results obtained on preliminary testing of our approach.},
  booktitle = {Proceedings of the 1992 {IEEE} {Computer} {Society} {Symposium} on {Research} in {Security} and {Privacy}},
  publisher = {IEEE Computer Society Press},
  author = {Debar, Herve and Becker, Monique and Siboni, Didier},
  month = {May},
  year = {1992},
  note = {00552 bibtex: debar1992neural},
  keywords = {Adaptive systems, Artificial Intelligence, Artificial neural networks, Computer displays, Computer hacking, Hardware, Intrusion detection, Neural networks, expert systems, neural nets, security of data, system testing, time series, user modelling},
  pages = {240--250}
}

Downloads: 0