Remote to Local Attack Detection Using Supervised Neural Network
In order to determine Remote to Local (R2L) attack, an intrusion detection technique based on artificial neural network is presented. This technique uses sampled dataset from Kddcup99 that is standard for benchmarking of attack detection tools. The backpropagation algorithm is used for training the...
| Main Authors: | Iftikhar, Ahmad, Azween, Abdullah, Abdullah , S. Alghamdi |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/3083/ http://scholars.utp.edu.my/id/eprint/3083/1/7.pdf |
Similar Items
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Supervised identification of Acinetobacter Baumanni strains using artificial neural network
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2019)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2019)
Predicting the stress level of students using supervised machine learning and artificial neural network (ANN)
by: Arya, Suraj, et al.
Published: (2024)
by: Arya, Suraj, et al.
Published: (2024)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
A review of Convolutional Neural Networks in Remote Sensing Image
by: Liu, Xinni, et al.
Published: (2019)
by: Liu, Xinni, et al.
Published: (2019)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Remote Mobile Nodes Service Delivery via VANET
by: Maythem kamal, Abbas, et al.
by: Maythem kamal, Abbas, et al.
Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks
by: Abusnaina, Ahmed A. A.
Published: (2015)
by: Abusnaina, Ahmed A. A.
Published: (2015)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
Automatic spinal deformity detection based on neural network
by: Kim, Hyoungseop, et al.
Published: (2003)
by: Kim, Hyoungseop, et al.
Published: (2003)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique
by: I. , Ahmad, et al.
Published: (2010)
by: I. , Ahmad, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Supervised Locally Linear Embedding in face recognition
by: Ying Han, Pang, et al.
Published: (2008)
by: Ying Han, Pang, et al.
Published: (2008)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
Suspense scene detection using recurrent neural network
by: Lim, Sin Hui
Published: (2021)
by: Lim, Sin Hui
Published: (2021)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
A Bio-Inspired Framework for Wireless Sensor Network Using Mobile Sensors
by: Ponnusamy , Vasaki, et al.
Published: (2010)
by: Ponnusamy , Vasaki, et al.
Published: (2010)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Similar Items
-
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010) -
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009) -
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010) -
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010) -
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)