[277] in Intrusion Detection Systems
Re: Neural Networks
daemon@ATHENA.MIT.EDU (Michael Sobirey)
Thu Jul 13 13:15:32 1995
From: Michael Sobirey <sobirey@informatik.tu-cottbus.de>
To: ids@uow.edu.au
Date: Thu, 13 Jul 1995 14:35:41 +0200 (METDST)
Reply-To: ids@uow.edu.au
Hi Bob,
> I am a graduate student looking for reference material related to the use of
> neural networks in intrusion detection. Any leads on research done in this area
> would be appreciated.
>
> Bob Katz, 100550.1744@compuserve.com
>
Debar, H.; Becker, M.; Siboni D.: A {\it neural network} component for an intrusion detection system, Proc. of the IEEE Symposium on Research in Computer Security and Privacy, Oakland, CA, May 1992, 1-11
Debar, H.; Dorizzi, B.: An application of a {\it recurrent} network to an intrusion detection system, Proc. of the International Joint Conference on Neural Networks, Baltimore, Maryland, June 1992, 478-483
(There is world-wide no mathematical proof for the convergence of learning
algorithms used in recurrent (!!) multi layer perceptrons.)
Fox, K. L.; Henning, R. R.; Reed, J. H.; Simonian, R. P.: A {\it neural network} approach towards intrusion detection, Proc. of the 13th National Computer Security Conference, Washington, D.C., Oct. 1990, 125-134
Clitherow, P.; Herrata, R.: A {\it connectionist} approach to monitoring computer audit trails, Bellcore, Piscaaway, NJ, 1989
In addition to it you can find short information about neural network approachesin the Data Security Letter.
Michael Sobirey
Cottbus University of Technology phone: (+49) 355 69 2101
Computer Science Institute fax: (+49) 355 69 2236
Postbox 10 13 44
D-03013 Cottbus Federal Republic of Germany