2024-03-28T18:40:35Zhttps://gredos.usal.es/oai/requestoai:gredos.usal.es:10366/1350852022-02-07T15:36:24Zcom_10366_122575com_10366_4512com_10366_3823col_10366_134811
Corchado Rodríguez, Emilio Santiago
Herrero Cosío, Álvaro
Sáiz, José M.
2017-09-06T09:16:24Z
2017-09-06T09:16:24Z
2005
Actas del III Taller de Minería de Datos y Aprendizaje (TAMIDA'2005); I Congreso Español de Informática (CEDI'2005).
http://hdl.handle.net/10366/135085
This research approaches the anomalous situations detection issue from a pattern recognition point of view, where a connectionist model is applied to identify user behavior patterns. The aim of this multidisciplinary research is the design of a system capable of detecting anomalous situations for a computer network. The connectionist architecture used here has never been applied to the Intrusion Detection (ID) and network security fields before this research. This work line demonstrates that connectionist models are capable of satisfying the requirements and dynamic features of the ID problem. By exploiting the strengths of neural networks in recognition, classification and generalization, this work illustrates the effectiveness of these techniques to the ID field. The presented Intrusion Detection System (IDS) is used as a method to investigate the traffic that travels along the analysed network, detecting SNMP (Simple Network Management Protocol) anomalous traffic patterns. It is also shown how the system is capable of detecting independent SNMP anomalous situations. It helps network administrators to decide if these anomalous situations are real intrusions or not.
application/pdf
en
Thomson
Attribution-NonCommercial-NoDerivs 3.0 Unported
https://creativecommons.org/licenses/by-nc-nd/3.0/
info:eu-repo/semantics/openAccess
Computer Science
A cooperative connectionist IDS model to identify independent anomalous SNMP situations
info:eu-repo/semantics/article