A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://www.gelbukh.com/polibits/2015_51/Detecting%20Simulated%20Attacks%20in%20Computer%20Networks%20Using%20Resilient%20Propagation%20Artificial%20Neural%20Networks.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Detecting Simulated Attacks in Computer Networks Using Resilient Propagation Artificial Neural Networks
<span title="2015-01-31">2015</span>
<i title="Centro de Innovacion y Desarrollo Tecnologico en Computo">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/msuxglkxsfc65p2nc6skdnp74i" style="color: black;">POLIBITS Research Journal on Computer Science and Computer Engineering With Applications</a>
</i>
In a large network, it is extremely difficult for an administrator or security personnel to detect which computers are being attacked and from where intrusions come. Intrusion detection systems using neural networks have been deemed a promising solution to detect such attacks. The reason is that neural networks have some advantages such as learning from training and being able to categorize data. Many studies have been done on applying neural networks in intrusion detection systems. This work
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17562/pb-51-1">doi:10.17562/pb-51-1</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6c3dmnumsbbirg4or6xi2ym63m">fatcat:6c3dmnumsbbirg4or6xi2ym63m</a>
</span>
more »
... esents a study of applying resilient propagation neural networks to detect simulated attacks. The approach includes two main components: the Data Preprocessing module and the Neural Network. The Data Preprocessing module performs normalizing data function while the Neural Network processes and categorizes each connection to find out attacks. The results produced by this approach are compared with present approaches. Index Terms-Computer security, artificial neural network, resilient propagation.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705120322/http://www.gelbukh.com/polibits/2015_51/Detecting%20Simulated%20Attacks%20in%20Computer%20Networks%20Using%20Resilient%20Propagation%20Artificial%20Neural%20Networks.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/9f/e9/9fe9337817fe301d97ce8aa0bfdf74195134cc06.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17562/pb-51-1">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>