Detecting and Classifying Attacks in Computer Networks Using Feed-Forward and Elman Neural Networks

@inproceedings{AlarconAquino2007DetectingAC,
  title={Detecting and Classifying Attacks in Computer Networks Using Feed-Forward and Elman Neural Networks},
  author={Vicente Alarcon-Aquino and J. A. Mejia-Sanchez and Roberto Rosas-Romero and Jos{\'e} Federico Ram{\'i}rez-Cruz},
  year={2007}
}
In this paper, we present an approach for detecting and classifying attacks in computer networks by using neural networks. Specifically, a design of an intruder detection system is presented to protect the hypertext transfer protocol (HTTP). We propose the use of an application-based model using neural networks to model properly non-linear data. The benefit of this perspective is to work directly on the causes of an attack, which are determined directly by the commands used in the protected… CONTINUE READING
2 Citations
14 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 14 references

Neural Networks: A Comprehensive Foundation, McMMillan

  • S. S. Haykin
  • New York,
  • 1994
Highly Influential
4 Excerpts

Immunologic System for intrusion detection at http protocol level

  • E. Torres
  • Department of Systems Engineering, Pontificia…
  • 2003
Highly Influential
4 Excerpts

C

  • C. Manikopoulos
  • and S. Papavassiliou, Network Intrusion and Fault…
  • 2002
Highly Influential
6 Excerpts

A Neural Network Application for Attack Detection in Computer Networks

  • L. de Sa Silva, A. C. Ferrari dos Santos, J.D.S. Da Silva, A. Montes
  • IEEE International Joint Conference on Neural…
  • 2004
2 Excerpts

Detección de Intrusos en Redes de Comunicaciones Utilizando Redes Neuronales

  • J. A. Mejia-Sanchez
  • Department of Electrical and Electronic…
  • 2004
5 Excerpts

Z

  • X. Jing-Sheng, S. Ji-Zhou
  • Xu., Recurrent Network in Network Intrusion…
  • 2004
3 Excerpts

Neural Network Toolbox

  • M. Beale, H. Demuth
  • Math Works, Inc. Massachusetts, USA,
  • 2003
2 Excerpts

Similar Papers

Loading similar papers…