About: Neural networks in intrusion detection systems     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for building anomaly sys
  • Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for building anomaly sys (en)
  • Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However these techniques are less successful when attack characteristics vary from built in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define normal and abnormal behaviour of a system. Also for building anomaly sys (cs)
Title
  • Neural networks in intrusion detection systems
  • Neural networks in intrusion detection systems (en)
  • Neuronové sítě v systémech pro detekci napadení (cs)
skos:prefLabel
  • Neural networks in intrusion detection systems
  • Neural networks in intrusion detection systems (en)
  • Neuronové sítě v systémech pro detekci napadení (cs)
skos:notation
  • RIV/60460709:41110/04:5038!RIV/2005/MSM/411105/N
http://linked.open.../vavai/riv/strany
  • 35;39
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • Z(MSM 411100010)
http://linked.open...iv/cisloPeriodika
  • 1
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 575938
http://linked.open...ai/riv/idVysledku
  • RIV/60460709:41110/04:5038
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • intrusion detection system (IDS), misuse IDS, anomaly IDS, Kohonen´s self-organizing maps (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...odStatuVydavatele
  • CZ - Česká republika
http://linked.open...ontrolniKodProRIV
  • [49E1FC8A11CF]
http://linked.open...i/riv/nazevZdroje
  • Zemědělská ekonomika
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...UplatneniVysledku
http://linked.open...v/svazekPeriodika
  • 50
http://linked.open...iv/tvurceVysledku
  • Veselý, Arnošt
  • Brechlerová, Dagmar
http://linked.open...n/vavai/riv/zamer
issn
  • 0139-570X
number of pages
http://localhost/t...ganizacniJednotka
  • 41110
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software