An application of a recurrent network to an intrusion detection system. Debar, H. & Dorizzi, B. In Proceedings of the International Joint Conference on Neural Networks (IJCNN 1992), volume 2, pages 478--483, Baltimore, MD, USA, June, 1992. IEEE Computer Society Press. 00095 bibtex: debar1992applicationPaper doi abstract bibtex We present an application of recurrent neural networks for intrusion detection. Such algorithms have been widely studied for time series prediction. Due to the characteristics of the temporal series that we consider, we have chosen a partially recurrent network for our application. After a description of the reactions of the network on classical problems, we present a prototype that we use to demonstrate the capability of neural nets in the field of intrusion detection.
@inproceedings{ debar_application_1992,
address = {Baltimore, MD, USA},
title = {An application of a recurrent network to an intrusion detection system},
volume = {2},
isbn = {0-7803-0559-0},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=226942},
doi = {10.1109/IJCNN.1992.226942},
abstract = {We present an application of recurrent neural networks for intrusion detection. Such algorithms have been widely studied for time series prediction. Due to the characteristics of the temporal series that we consider, we have chosen a partially recurrent network for our application. After a description of the reactions of the network on classical problems, we present a prototype that we use to demonstrate the capability of neural nets in the field of intrusion detection.},
booktitle = {Proceedings of the {International} {Joint} {Conference} on {Neural} {Networks} ({IJCNN} 1992)},
publisher = {IEEE Computer Society Press},
author = {Debar, Hervé and Dorizzi, Bernadette},
month = {June},
year = {1992},
note = {00095 bibtex: debar1992application},
keywords = {Application software, Computer hacking, Cryptography, Intrusion detection, Neural networks, Operating systems, Prototypes, Recurrent neural networks, access control, anomaly detection, computer security, recurrent neural nets, safety systems, security of data, user behavior model},
pages = {478--483}
}
Downloads: 0
{"_id":"Ax9qAqvpj9Bz6Fqv4","bibbaseid":"debar-dorizzi-anapplicationofarecurrentnetworktoanintrusiondetectionsystem-1992","downloads":0,"creationDate":"2015-04-22T00:15:38.268Z","title":"An application of a recurrent network to an intrusion detection system","author_short":["Debar, H.","Dorizzi, B."],"year":1992,"bibtype":"inproceedings","biburl":"http://bibbase.org/zotero/ealprr","bibdata":{"abstract":"We present an application of recurrent neural networks for intrusion detection. Such algorithms have been widely studied for time series prediction. Due to the characteristics of the temporal series that we consider, we have chosen a partially recurrent network for our application. After a description of the reactions of the network on classical problems, we present a prototype that we use to demonstrate the capability of neural nets in the field of intrusion detection.","address":"Baltimore, MD, USA","author":["Debar, Hervé","Dorizzi, Bernadette"],"author_short":["Debar, H.","Dorizzi, B."],"bibtex":"@inproceedings{ debar_application_1992,\n address = {Baltimore, MD, USA},\n title = {An application of a recurrent network to an intrusion detection system},\n volume = {2},\n isbn = {0-7803-0559-0},\n url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=226942},\n doi = {10.1109/IJCNN.1992.226942},\n abstract = {We present an application of recurrent neural networks for intrusion detection. Such algorithms have been widely studied for time series prediction. Due to the characteristics of the temporal series that we consider, we have chosen a partially recurrent network for our application. After a description of the reactions of the network on classical problems, we present a prototype that we use to demonstrate the capability of neural nets in the field of intrusion detection.},\n booktitle = {Proceedings of the {International} {Joint} {Conference} on {Neural} {Networks} ({IJCNN} 1992)},\n publisher = {IEEE Computer Society Press},\n author = {Debar, Hervé and Dorizzi, Bernadette},\n month = {June},\n year = {1992},\n note = {00095 bibtex: debar1992application},\n keywords = {Application software, Computer hacking, Cryptography, Intrusion detection, Neural networks, Operating systems, Prototypes, Recurrent neural networks, access control, anomaly detection, computer security, recurrent neural nets, safety systems, security of data, user behavior model},\n pages = {478--483}\n}","bibtype":"inproceedings","booktitle":"Proceedings of the International Joint Conference on Neural Networks (IJCNN 1992)","doi":"10.1109/IJCNN.1992.226942","id":"debar_application_1992","isbn":"0-7803-0559-0","key":"debar_application_1992","keywords":"Application software, Computer hacking, Cryptography, Intrusion detection, Neural networks, Operating systems, Prototypes, Recurrent neural networks, access control, anomaly detection, computer security, recurrent neural nets, safety systems, security of data, user behavior model","month":"June","note":"00095 bibtex: debar1992application","pages":"478--483","publisher":"IEEE Computer Society Press","title":"An application of a recurrent network to an intrusion detection system","type":"inproceedings","url":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=226942","volume":"2","year":"1992","bibbaseid":"debar-dorizzi-anapplicationofarecurrentnetworktoanintrusiondetectionsystem-1992","role":"author","urls":{"Paper":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=226942"},"keyword":["Application software","Computer hacking","Cryptography","Intrusion detection","Neural networks","Operating systems","Prototypes","Recurrent neural networks","access control","anomaly detection","computer security","recurrent neural nets","safety systems","security of data","user behavior model"],"downloads":0},"search_terms":["application","recurrent","network","intrusion","detection","system","debar","dorizzi"],"keywords":["application software","computer hacking","cryptography","intrusion detection","neural networks","operating systems","prototypes","recurrent neural networks","access control","anomaly detection","computer security","recurrent neural nets","safety systems","security of data","user behavior model"],"authorIDs":[],"dataSources":["fcy64Zdm28gydMmuE"]}