Fechar

@InProceedings{SilvaSantSilvMont:2004:NeNeAp,
               author = "Silva, L{\'{\i}}lia de S{\'a} and Santos, Adriana Cristina 
                         Ferrari dos and Silva, Jos{\'e} Dem{\'{\i}}sio Sim{\~o}es da 
                         and Montes, Antonio",
                title = "A neural network application for attack detection in computer 
                         networks.",
            booktitle = "Proceedings...",
                 year = "2004",
                pages = "6",
         organization = "International Joint Conference on Neural Networks, (IJCNN).",
            publisher = "INPE",
             keywords = "Detec{\c{c}}{\~a}o de intrus{\~a}o, detec{\c{c}}{\~a}o por 
                         assinatura, seguran{\c{c}}a em redes, redes neurais, hamming 
                         net.",
             abstract = "Abstract – This work presents a network intrusion detection 
                         method, created to identify and classify illegitimate information 
                         in TCP/IP packet payload based on the Snort signature set that 
                         represents possible attacks to a network. For this development a 
                         type of neural network named Hamming Net was used. The choice of 
                         this network is based on the interest to investigate its adequacy 
                         to classify network events in real-time, due to is capability to 
                         learn faster than other neural network models, such as, multilayer 
                         perceptrons with backpropagation and Kohonen maps. A Hamming Net 
                         does not require exhaustive training to learn. TCP/IP packet 
                         payloads were used as input pattern to the Hamming Net and Snort 
                         signature as exemplar patterns. The challenges faced to model the 
                         input and exemplar data and the strategies adopted to capture and 
                         scan relevant data in TCP/IP packets and in Snort signatures are 
                         described in this paper. In addition, the application 
                         architecture, the processing stages and some test results are 
                         presented.",
  conference-location = "Hungria",
      conference-year = "25 a 29 de julho",
           copyholder = "SID/SCD",
             language = "en",
                  ibi = "sid.inpe.br/marciana/2004/12.03.10.53",
                  url = "http://urlib.net/ibi/sid.inpe.br/marciana/2004/12.03.10.53",
           targetfile = "Lilia 1572_ijcnn2004.PDF",
        urlaccessdate = "20 abr. 2024"
}


Fechar