Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/1374
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPanigrahy, S K-
dc.contributor.authorMahapatra, J R-
dc.contributor.authorMohanty, J-
dc.contributor.authorJena, S K-
dc.date.accessioned2011-02-02T10:12:47Z-
dc.date.available2011-02-02T10:12:47Z-
dc.date.issued2011-01-
dc.identifier.citationInternational Conference on Advances in Computing, Communication and Control, 2011 (ICAC3'11), P 300-305en
dc.identifier.isbn978-3-642-18439-0-
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-642-18440-6_38-
dc.identifier.urihttp://hdl.handle.net/2080/1374-
dc.descriptionCopyright belongs to Proceedings Publisher-Springer Verlagen
dc.description.abstractAnomaly detection attempts to recognize abnormal behavior to detect intrusions. We have concentrated to design a prototype UNIX Anomaly Detection System. Neural Networks are tolerant of imprecise data and uncertain information. A tool has been devised for detecting such intrusions into the network. The tool uses the machine learning approaches and clustering techniques like Self Organizing Map and compares it with the K-means approach. Our system is described for applying hierarchical unsupervised neural network to intrusion detection system.en
dc.format.extent219251 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherSpringeren
dc.relation.ispartofseriesCCIS;Vol 125-
dc.subjectIntrusion detectionen
dc.subjectanomaly detectionen
dc.subjectself organizing mapen
dc.subjectneural networksen
dc.titleAnomaly Detection in Ethernet Networks Using Self Organizing Mapsen
dc.typeArticleen
dc.typeBook chapteren
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
adsom.pdf214.11 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.