Investigation of neural network classification of computer network attacks

@article{Zhang2003InvestigationON,
  title={Investigation of neural network classification of computer network attacks},
  author={Zheng Zhang and Constantine N. Manikopoulos},
  journal={International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.},
  year={2003},
  pages={590-594}
}
We investigate the neural network classification of computer network attacks using statistical anomaly detection, carried out by HIDE. HIDE is a hierarchical, multitier, multiobservation-window, anomaly based network intrusion detection system, prototyped in our laboratory for the US Army's Tactical Internet. HIDE monitors several network traffic parameters simultaneously, constructs a probability density function (PDF) for each, statistically compares it to a reference PDF of normal behavior… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 14 CITATIONS

Performance metrics for network intrusion systems

VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems

  • 2007 41st Annual IEEE International Carnahan Conference on Security Technology
  • 2007
VIEW 1 EXCERPT

References

Publications referenced by this paper.
SHOWING 1-2 OF 2 REFERENCES

Detecting anomalous and unknown intrusions against programs

  • Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
  • 1998

Manikopulos , 1 . lorgenson , Representation and Reduction ofNshuark Inmion Detection Data

C. Zhang