International Journal of Soft Computing

Year: 2012
Volume: 7
Issue: 2
Page No. 44 - 49

Design and Analysis of ANN-Based Echo State Network Intrusion Detection in Computer Networks

Authors : S. Saravanakumar, T.A. Mohanaprakash, R. Dharani and C. Jaya Kumar

References

Bu, S., F.R. Yu, X.P. Liu, P. Mason and H. Tang, 2011. Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans. Vehicular Technol., 60: 1025-1036.
CrossRef  |  

Carpenter, G.A. and S. Grossberg, 1987. ART 2: Self-organization of stable category recognition codes for analog input patterns. Applied Optics, 26: 4919-4930.
Direct Link  |  

Chavan, S., K. Shah, N. Dave and S. Mukherjee, 2004. Adaptive neuro-fuzzy intrusion detection systems. Proceedings of the International Conference on Information Technology: Coding and Computing, April 5-7, 2004, Las Vegas, USA -.

Helman, P. and G. Liepins, 1993. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. Software Eng., 19: 886-901.
CrossRef  |  

Jaeger, H., 2002. Short term memory in echo state networks. (Tech. Rep. No. 152). German National Research Center for Information Technology, Bremen.

Jaeger, H., 2002. Tutorial on training recurrent neural networks, covering BPPT, RTRL, EKF and the "echo state network" approach. GMD Report 159, German National Research Center for Information Technology, pp: 48. http://minds.jacobs-university.de/sites/default/files/uploads/papers/ESNTutorialRev.pdf.

Katar C., 2006. Combining multiple techniques for intrusion detection. JCSNS Int. J. Comput. Sci. Network Secur., 6: 208-218.
Direct Link  |  

Kohonen, T., 1990. The self-organizing maps. Proc. IEEE, 78: 1464-1480.
Direct Link  |  

Kou, G., Y. Peng, Y. Shi and Z. Chen, 2006. Network intrusion detection by multi-group mathematical programming based classifier. Proceedings of the 6th IEEE International Conference on Data Mining Workshops, December 2006, Hong Kong, pp: 803-807.

Li, Q.H., S.Y. Jiang and X. Li, 2004. A supervised intrusion detection method. Proc. Int. Conf. Mach. Learn. Cybern., 3: 1475-1479.
CrossRef  |  

Liu, J., F.R. Yu, C.H. Lung and H. Tang, 2009. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans. Wireless Commun., 8: 806-815.
CrossRef  |  

Rapaka, A., A. Novokhodko and D. Wunsch, 2003. Intrusion detection using radial basis function network on sequences of system calls. Int. Joint Conf. Neural Networks, 3: 1820-1825.
CrossRef  |  

Sarra, S.A., 2006. Integrated multiquadric radial basis function approximation methods. Comput. Math. Appl., 51: 1283-1296.
CrossRef  |  

Shihab, K., 2006. A back propagation neural network for computer network security. J. Comput. Sci., 2: 710-715.
CrossRef  |  Direct Link  |  

Xue, J.S., J.Z. Sun and X. Zhang, 2006. Recurrent network in network in network intrusion detection system. Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, August 26-29, 2006, Shanghai -.

Zhang, B., X. Pan and J. Wang, 2007. Hybrid intrusion detection system for complicated network. Proceedings of the 4th International Conference on Fuzzy Systems and Knowledge, August 24-27, 2007, Haikou, Hainan, China, -.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved