Fast intrusion detection system based on flexible neural tree
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F10%3A86085135" target="_blank" >RIV/61989100:27240/10:86085135 - isvavai.cz</a>
Result on the web
<a href="http://dx.doi.org/10.1109/ISIAS.2010.5604057" target="_blank" >http://dx.doi.org/10.1109/ISIAS.2010.5604057</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/ISIAS.2010.5604057" target="_blank" >10.1109/ISIAS.2010.5604057</a>
Alternative languages
Result language
angličtina
Original language name
Fast intrusion detection system based on flexible neural tree
Original language description
Computer security is very important in these days. Computers are used probably in any industry and their protection against attacks is very important task. The protection usually consist in several levels. The first level is preventions. Intrusion detection system (IDS) may be used as next level. IDS is useful in detection of intrusions, but also in monitoring of security issues and the traffic. This paper present IDS based on Flexible Neural Trees. Flexible neural tree is hierarchical neural network, which is automatically created using evolutionary algorithms to solving of defined problem. This is very important, because it is not necessary to set the structure and the weights of neural networks prior the problem is solved. The accuracy of proposed technique is always above 98% and the speed of decision making process enable its using in real-time applications. 2010 IEEE. 2010 IEEE.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/FR-TI1%2F420" target="_blank" >FR-TI1/420: *Integrated software system for optimalization and control of technological processes and prediction of production quality for large technological complexes with use of advanced mathematic method, simulation and artificial intelligence.</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2010
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
2010 6th International Conference on Information Assurance and Security, IAS 2010
ISBN
978-1-4244-7408-0
ISSN
—
e-ISSN
—
Number of pages
6
Pages from-to
106-111
Publisher name
IEEE
Place of publication
New York
Event location
Atlanta
Event date
Aug 23, 2010
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—