Neural networks in intrusion detection systems
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60460709%3A41110%2F04%3A5038" target="_blank" >RIV/60460709:41110/04:5038 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Neural networks in intrusion detection systems
Original language description
Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purposeIntrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for build
Czech name
Neuronové sítě v systémech pro detekci napadení
Czech description
Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purposeIntrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for build
Classification
Type
J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)
CEP classification
JD - Use of computers, robotics and its application
OECD FORD branch
—
Result continuities
Project
—
Continuities
Z - Vyzkumny zamer (s odkazem do CEZ)
Others
Publication year
2004
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Zemědělská ekonomika
ISSN
0139-570X
e-ISSN
—
Volume of the periodical
50
Issue of the periodical within the volume
1
Country of publishing house
CZ - CZECH REPUBLIC
Number of pages
5
Pages from-to
35-39
UT code for WoS article
—
EID of the result in the Scopus database
—