Attributes | Values |
---|
rdf:type
| |
Description
| - Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for building anomaly sys
- Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for building anomaly sys (en)
- Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for building anomaly sys (cs)
|
Title
| - Neural networks in intrusion detection systems
- Neural networks in intrusion detection systems (en)
- Neuronové sítě v systémech pro detekci napadení (cs)
|
skos:prefLabel
| - Neural networks in intrusion detection systems
- Neural networks in intrusion detection systems (en)
- Neuronové sítě v systémech pro detekci napadení (cs)
|
skos:notation
| - RIV/60460709:41110/04:5038!RIV/2005/MSM/411105/N
|
http://linked.open.../vavai/riv/strany
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...iv/cisloPeriodika
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/60460709:41110/04:5038
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - intrusion detection system (IDS), misuse IDS, anomaly IDS, Kohonen´s self-organizing maps (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...odStatuVydavatele
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/nazevZdroje
| |
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...v/svazekPeriodika
| |
http://linked.open...iv/tvurceVysledku
| - Veselý, Arnošt
- Brechlerová, Dagmar
|
http://linked.open...n/vavai/riv/zamer
| |
issn
| |
number of pages
| |
http://localhost/t...ganizacniJednotka
| |