A novel host intrusion detection system using neural network

Parisa Lotfallahtabrizi, Yasser Morgan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Over the last decades, the development of information technology in the field of computer systems and smart-devices has been increasing rapidly. Especially, due to the improvement of smart-devices, they have become a necessary ubiquitous device influencing our daily life. Nowadays, with the popularity of computer systems and smart-devices, the exposure to security risks has been on the rise throughout the world. Therefore, systems security (e.g. computer systems and smart-devices security) has become a significant concern. In order to alleviate security risks, cybersecurity researchers have concentrated more on presenting novel, high-qualified, and integrated security systems.

Original languageEnglish
Title of host publication2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018
EditorsSatyajit Chakrabarti, Himadri Nath Saha
Pages124-130
Number of pages7
ISBN (Electronic)9781538646496
DOIs
StatePublished - 22 Feb 2018
Event8th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2018 - Las Vegas, United States
Duration: 8 Jan 201810 Jan 2018

Publication series

Name2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018
Volume2018-January

Conference

Conference8th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2018
Country/TerritoryUnited States
CityLas Vegas
Period8/01/1810/01/18

Keywords

  • anomaly-based system
  • artificial neural networks
  • back propagation
  • cybersecurity
  • feed forward neural network
  • host intrusion detection system
  • pattern recognition
  • security threats
  • signature-based system
  • smart-devices

Fingerprint

Dive into the research topics of 'A novel host intrusion detection system using neural network'. Together they form a unique fingerprint.

Cite this