Implementation of an intrusion detection system based on self organizing map

The main purpose of this study is to identify a methodology to validate the effectiveness of an Intrusion Detection Systems proposed in three phases (selection, training and classification) using FDR to feature selection and Self Organizing Maps to training-classification. Therefore, initially are c...

Full description

Autores:
De-La-Hoz-Franco, Emiro
Ortiz García, Andrés
Ortega Lopera, Julio
De La Hoz Correa, Eduardo Miguel
Mendoza Palechor, Fabio Enrique
Tipo de recurso:
Article of journal
Fecha de publicación:
2015
Institución:
Corporación Universidad de la Costa
Repositorio:
REDICUC - Repositorio CUC
Idioma:
eng
OAI Identifier:
oai:repositorio.cuc.edu.co:11323/3253
Acceso en línea:
https://hdl.handle.net/11323/3253
https://repositorio.cuc.edu.co/
Palabra clave:
Intrusion detection system – IDS
Self-organizing map – SOM
Fisher’s discriminant rate – FDR
Gaussian mixture model (GMM)
Dataset NSL-KDD
Sistema de detección de intrusos - IDS
Mapa autoorganizado - SOM
Tasa discriminaste de fisher - FDR
Mezcla gaussiana modelo (GMM)
Conjunto de datos NSL-KDD
Rights
openAccess
License
http://creativecommons.org/licenses/by-nc-sa/4.0/
id RCUC2_2bd5c159a2d70e97b8868832296d394a
oai_identifier_str oai:repositorio.cuc.edu.co:11323/3253
network_acronym_str RCUC2
network_name_str REDICUC - Repositorio CUC
repository_id_str
dc.title.spa.fl_str_mv Implementation of an intrusion detection system based on self organizing map
dc.title.translated.spa.fl_str_mv Implementación de un sistema de detección de intrusos basado en un mapa auto organizado.
title Implementation of an intrusion detection system based on self organizing map
spellingShingle Implementation of an intrusion detection system based on self organizing map
Intrusion detection system – IDS
Self-organizing map – SOM
Fisher’s discriminant rate – FDR
Gaussian mixture model (GMM)
Dataset NSL-KDD
Sistema de detección de intrusos - IDS
Mapa autoorganizado - SOM
Tasa discriminaste de fisher - FDR
Mezcla gaussiana modelo (GMM)
Conjunto de datos NSL-KDD
title_short Implementation of an intrusion detection system based on self organizing map
title_full Implementation of an intrusion detection system based on self organizing map
title_fullStr Implementation of an intrusion detection system based on self organizing map
title_full_unstemmed Implementation of an intrusion detection system based on self organizing map
title_sort Implementation of an intrusion detection system based on self organizing map
dc.creator.fl_str_mv De-La-Hoz-Franco, Emiro
Ortiz García, Andrés
Ortega Lopera, Julio
De La Hoz Correa, Eduardo Miguel
Mendoza Palechor, Fabio Enrique
dc.contributor.author.spa.fl_str_mv De-La-Hoz-Franco, Emiro
Ortiz García, Andrés
Ortega Lopera, Julio
De La Hoz Correa, Eduardo Miguel
Mendoza Palechor, Fabio Enrique
dc.subject.spa.fl_str_mv Intrusion detection system – IDS
Self-organizing map – SOM
Fisher’s discriminant rate – FDR
Gaussian mixture model (GMM)
Dataset NSL-KDD
Sistema de detección de intrusos - IDS
Mapa autoorganizado - SOM
Tasa discriminaste de fisher - FDR
Mezcla gaussiana modelo (GMM)
Conjunto de datos NSL-KDD
topic Intrusion detection system – IDS
Self-organizing map – SOM
Fisher’s discriminant rate – FDR
Gaussian mixture model (GMM)
Dataset NSL-KDD
Sistema de detección de intrusos - IDS
Mapa autoorganizado - SOM
Tasa discriminaste de fisher - FDR
Mezcla gaussiana modelo (GMM)
Conjunto de datos NSL-KDD
description The main purpose of this study is to identify a methodology to validate the effectiveness of an Intrusion Detection Systems proposed in three phases (selection, training and classification) using FDR to feature selection and Self Organizing Maps to training-classification. Therefore, initially are covered basics introductory in the first four items, related to the input dataset, the intrusion detection system and the metrics that are necessary to evaluate the IDS, the feature extraction technique FDR and the funcionality about the self-organizing map (SOM). Later in the methodology Item, in the body of the paper, a functional model proposed to described the intrusion detection, such model is validated from the comparation of metrics in simulation develops enviroments. Finally concluded that the detection rates obtained by the proposed functional model are: sensitivity of 97.39% (fits correctly identified as attacks) and a specificityof 62.73% (normal traffic correctly identified as normal traffic) using only 17 features of the dataset input.These results are compared with other simulating scenarios different, consulted from the documentary sources, from which it is suggested to integrate at the proposed model other techniques for training and classification processes to optimize the intrusion detection model.
publishDate 2015
dc.date.issued.none.fl_str_mv 2015-01-31
dc.date.accessioned.none.fl_str_mv 2019-05-08T15:06:47Z
dc.date.available.none.fl_str_mv 2019-05-08T15:06:47Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
format http://purl.org/coar/resource_type/c_6501
status_str acceptedVersion
dc.identifier.issn.spa.fl_str_mv 1992-8645
dc.identifier.uri.spa.fl_str_mv https://hdl.handle.net/11323/3253
dc.identifier.instname.spa.fl_str_mv Corporación Universidad de la Costa
dc.identifier.reponame.spa.fl_str_mv REDICUC - Repositorio CUC
dc.identifier.repourl.spa.fl_str_mv https://repositorio.cuc.edu.co/
identifier_str_mv 1992-8645
Corporación Universidad de la Costa
REDICUC - Repositorio CUC
url https://hdl.handle.net/11323/3253
https://repositorio.cuc.edu.co/
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.references.spa.fl_str_mv The NSL-KDD Dataset. http://nsl.cs.unb.ca/NSL-KDD/. SourceFire - Snort. http://www.snort.org/. CheckPoint® Software Technologies Ltd. NFR (Network Flight Recorder). http://www.checkpoint.com/corporate/nfr/index.html. CISCO System. Cisco Intrusion Detection (NetRanger). http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml. IBM. RealSecure Network Sensor. http://www947.ibm.com/support/entry/portal/Overview/So ftware/Tivoli/RealSecure_Network_Sensor. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani. “A Detailed Analysis of the KDD CUP 99 Data Set”, IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, pp. 1 – 6, july 2009. M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang. “A novel anomaly detection scheme based on principal component classifier,” Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM03), pp. 172–179, 2003. USC Information Sciences Intitute. “Common Intrusion Detection Framework”, http://gost.isi.edu/cidf/. Enero-2014. CIDF Working Group (Clifford Kahn, Don Bolinger and Dan Schnackenberg). DRAFT Specification. Communication in the Common Intrusion Detection Framework v 0.7. 8 June 1998.http://gost.isi.edu/cidf/drafts/communication.txt. [10] R. Feiertag, C. Kahn, P. Porras, D. Schnackenberg. A Common Intrusion Specification Language (CISL). 11 June 1999. http://gost.isi.edu/cidf/drafts/language.txt. Common Vulnerabilities and Exposures – CVE. http://cve.mitre.org/about/index.html. Prelude Technologies. http://www.preludetechnologies.com/. SRI - International a real-time IntrusionDetection Expert System (IDES). http://www.csl.sri.com/papers/9sri/9sri.pdf. S. Noel, D. Wijesekera, C. Youman. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. In Applications of Data Mining in Computer Security, D. Barbarà and S. Jajodia (eds.), Kluwer Academic Publisher, 2002. A. Lazarevic, J. Srivastava, V. Kumar. A Survey of Intrusion Detection techniques. book "Managing Cyber Threats: Issues, Approaches and Challenges", to be published by Kluwer in spring 2004. A. Balakrishnama. Linear Discriminant Analysis - A Brief Tutorial, Institute for Signal and Information Processing, Department of Electrical and Computer Engineering, Mississippi State University. 1998. R. Fisher. The Use of Multiple Measurements in Taxonomic Problems In: Annals of Eugenics, 7, p. 179—188. 1936. V. Venkatachalam, S. Selvan. Performance comparison of intrusion detection system classifiers using various feature reduction techniques. International journal of simulation, 2008 - Citeseer. T. Kohonen. “Self-organizing Maps”. Springer Series in Information Sciences. Volume 30, 1997. 2nd edition. Kohonen’s Self Organizing Feature Maps. http://www.ai-junkie.com/ann/som/som1.html. D. Phuc, M. Xuan. Using SOM based Graph Clustering for Extracting Main Ideas from Documents. Research, Innovation and Vision for the Future, 2008. RIVF 2008. IEEE International Conference on. p, 209 – 214. July 2008. I. Manolakos, E. Logaras. High throughput systolic SOM IP core for FPGAs. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. P, II61 - II-64. April 2007.G K. Yin, L. Gang. Fault Pattern Recognition of Thermodynamic System Based on SOM. Electrical and Control Engineering (ICECE), 2010. International Conference on. P, 3742 – 3745. June 2010. L. Min, W. Dongliang. Anormaly Intrusion Detection Based on SOM. Information Engineering, 2009. ICIE '09. WASE International Conference on. P, 40 – 43. July 2009. J.C. Patra, J. Abraham, P.K. Meher, G. Chakraborty. An Improved SOM-based Visualization Technique for DNA Microarray Data Analysis. Neural Networks (IJCNN), The 2010 International Joint Conference on. P, 1 – 7. July 2010. B. Fritzke. (1995). A growing neural gas network learns topologies. In Tesauro, G., Touretzky, D. S., and Leen, T. K., editors, Advances in Neural Information Processing Systems 7, pages 625–632. MIT Press, Cambridge MA. T. Martinez, K. Schulten, (1994). Topology representing networks. Neural Networks, 7(3):507–522. [28] A. Ocsa, C. Bedregal, E. Cuadros-Vargas, (2007). DB-GNG: A constructive selforganizing map based on density. In Proceedings of the International JointConference on Neural Networks (IJCNN07). IEEE. Y. Prudent, A. Ennaji. (2005). A k nearest classifier design. ELCVIA, 5(2):58–71. R. H. White. (1992). Competitive hebbian learning: algorithm and demonstrations. Neural Networks, 5(2):261–2. F. Mendoza, E. de la hoz, A. de la hoz, Application of feast (Feature Selection Toolbox) in IDS (Intrusion Detection Systems), vol.70, No.3, Journal of Theoretical and Applied Information Technology – JATIT, 2014, pp. 579-585. E. de la Hoz, E. de la Hoz, A. Ortiz, J. Ortega, Network anomaly detection with Bayesian self-organizing maps, in: Proceedings of the International Work-Conference on Artificial Neural Networks (IWANN), LNCS, vol. 7092, Springer-Verlag, 2013, pp. 532–537. E. de la Hoz, A. Ortiz, J. Ortega, E. de la Hoz. Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques, in: Proceedings of the International Conference on Hybrid Artificial Intelligence Systems (HAIS), LNAI, vol. 8073, Springer-Verlag, 2013, pp. 103–111. E. de la Hoz, E. de la Hoz, A. Ortiz, J. Ortega, A. Martínez-Álvarez, Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps, vol. 71, KnowledgeBased Systems, 2014, pp. 322-338. C. Guo et al. Efficient intrusion detection using representative instances, vol. 39, Computers & Security, 2013, pp. 255-267. R. K. Idowu et al. An Application of Membrane Computing to Anomaly-Based Intrusion Detection System, vol. 11, Procedia Technology, 2013, pp. 585–592. G.V. Nadiammai, M. Hemalatha. Effective approach toward Intrusion Detection System using data mining techniques, vol. 15, Egyptian Informatics Journal - Cairo University, 2014, pp. 37–50.
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.publisher.spa.fl_str_mv Journal of theoretical and applied information technology
institution Corporación Universidad de la Costa
bitstream.url.fl_str_mv https://repositorio.cuc.edu.co/bitstreams/6f1cd548-30d9-43b5-9e2b-057b87f4299f/download
https://repositorio.cuc.edu.co/bitstreams/f458590f-da7d-4d18-b1a4-d067031c4fb7/download
https://repositorio.cuc.edu.co/bitstreams/5639bcbe-6ef5-4adc-ba75-1d13b84b0ee3/download
https://repositorio.cuc.edu.co/bitstreams/b39f77f5-d905-4e5c-9fbb-44d4f1ad874e/download
https://repositorio.cuc.edu.co/bitstreams/947eb4c2-a720-427e-8ecb-15a303b0f896/download
bitstream.checksum.fl_str_mv c86c8a26b162cd7c60b8489f4ea6af61
934f4ca17e109e0a05eaeaba504d7ce4
8a4605be74aa9ea9d79846c1fba20a33
8ccc7e1a1617605ccaba7652e5d40c9b
e869872ca9d55f066042dea716bcc472
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad de la Costa CUC
repository.mail.fl_str_mv repdigital@cuc.edu.co
_version_ 1811760845907034112
spelling De-La-Hoz-Franco, EmiroOrtiz García, AndrésOrtega Lopera, JulioDe La Hoz Correa, Eduardo MiguelMendoza Palechor, Fabio Enrique2019-05-08T15:06:47Z2019-05-08T15:06:47Z2015-01-311992-8645https://hdl.handle.net/11323/3253Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/The main purpose of this study is to identify a methodology to validate the effectiveness of an Intrusion Detection Systems proposed in three phases (selection, training and classification) using FDR to feature selection and Self Organizing Maps to training-classification. Therefore, initially are covered basics introductory in the first four items, related to the input dataset, the intrusion detection system and the metrics that are necessary to evaluate the IDS, the feature extraction technique FDR and the funcionality about the self-organizing map (SOM). Later in the methodology Item, in the body of the paper, a functional model proposed to described the intrusion detection, such model is validated from the comparation of metrics in simulation develops enviroments. Finally concluded that the detection rates obtained by the proposed functional model are: sensitivity of 97.39% (fits correctly identified as attacks) and a specificityof 62.73% (normal traffic correctly identified as normal traffic) using only 17 features of the dataset input.These results are compared with other simulating scenarios different, consulted from the documentary sources, from which it is suggested to integrate at the proposed model other techniques for training and classification processes to optimize the intrusion detection model.El propósito principal de este estudio es identificar una metodología para validar la efectividad de los sistemas de detección de intrusiones propuestos en tres fases (selección, entrenamiento y clasificación) utilizando FDR para la selección de características y mapas autoorganizados para la clasificación de entrenamiento. Por lo tanto, inicialmente se cubren aspectos básicos introductorios en los primeros cuatro elementos, relacionados con el conjunto de datos de entrada, el sistema de detección de intrusiones y las métricas que son necesarias para evaluar el IDS, la técnica de extracción de características FDR y la funcionalidad sobre el mapa autoorganizado (SOM). ). Más adelante en la metodología Ítem, en el cuerpo del artículo, un modelo funcional propuesto para describir la detección de intrusos, dicho modelo se valida a partir de la comparación de métricas en entornos de desarrollo de simulación. Finalmente, concluyó que las tasas de detección obtenidas por el modelo funcional propuesto son: sensibilidad del 97.39% (se ajusta correctamente como ataques) y una especificidad del 62.73% (tráfico normal correctamente identificado como tráfico normal) usando solo 17 características de la entrada del conjunto de datos. Estos resultados se comparan con otros escenarios de simulación diferentes, consultados desde las fuentes documentales, desde los cuales se sugiere integrar en el modelo propuesto otras técnicas de entrenamiento y procesos de clasificación para optimizar el modelo de detección de intrusos.De la Hoz, Emiro-will be generated-orcid-0000-0002-4926-7414-600Ortiz García, Andrés-3bf0a697-42b8-4eee-baff-747689323f53-0Ortega Lopera, Julio-2f0915be-defc-47d7-9c51-c4d8182d1c37-0De La Hoz Correa, Eduardo Miguel-f50d0e8b-2e3b-4e05-816a-bcd89cf4b021-0Mendoza Palechor, Fabio Enrique-0000-0002-2755-0841-600engJournal of theoretical and applied information technologyhttp://creativecommons.org/licenses/by-nc-sa/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Intrusion detection system – IDSSelf-organizing map – SOMFisher’s discriminant rate – FDRGaussian mixture model (GMM)Dataset NSL-KDDSistema de detección de intrusos - IDSMapa autoorganizado - SOMTasa discriminaste de fisher - FDRMezcla gaussiana modelo (GMM)Conjunto de datos NSL-KDDImplementation of an intrusion detection system based on self organizing mapImplementación de un sistema de detección de intrusos basado en un mapa auto organizado.Artículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersionThe NSL-KDD Dataset. http://nsl.cs.unb.ca/NSL-KDD/. SourceFire - Snort. http://www.snort.org/. CheckPoint® Software Technologies Ltd. NFR (Network Flight Recorder). http://www.checkpoint.com/corporate/nfr/index.html. CISCO System. Cisco Intrusion Detection (NetRanger). http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml. IBM. RealSecure Network Sensor. http://www947.ibm.com/support/entry/portal/Overview/So ftware/Tivoli/RealSecure_Network_Sensor. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani. “A Detailed Analysis of the KDD CUP 99 Data Set”, IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, pp. 1 – 6, july 2009. M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang. “A novel anomaly detection scheme based on principal component classifier,” Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM03), pp. 172–179, 2003. USC Information Sciences Intitute. “Common Intrusion Detection Framework”, http://gost.isi.edu/cidf/. Enero-2014. CIDF Working Group (Clifford Kahn, Don Bolinger and Dan Schnackenberg). DRAFT Specification. Communication in the Common Intrusion Detection Framework v 0.7. 8 June 1998.http://gost.isi.edu/cidf/drafts/communication.txt. [10] R. Feiertag, C. Kahn, P. Porras, D. Schnackenberg. A Common Intrusion Specification Language (CISL). 11 June 1999. http://gost.isi.edu/cidf/drafts/language.txt. Common Vulnerabilities and Exposures – CVE. http://cve.mitre.org/about/index.html. Prelude Technologies. http://www.preludetechnologies.com/. SRI - International a real-time IntrusionDetection Expert System (IDES). http://www.csl.sri.com/papers/9sri/9sri.pdf. S. Noel, D. Wijesekera, C. Youman. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. In Applications of Data Mining in Computer Security, D. Barbarà and S. Jajodia (eds.), Kluwer Academic Publisher, 2002. A. Lazarevic, J. Srivastava, V. Kumar. A Survey of Intrusion Detection techniques. book "Managing Cyber Threats: Issues, Approaches and Challenges", to be published by Kluwer in spring 2004. A. Balakrishnama. Linear Discriminant Analysis - A Brief Tutorial, Institute for Signal and Information Processing, Department of Electrical and Computer Engineering, Mississippi State University. 1998. R. Fisher. The Use of Multiple Measurements in Taxonomic Problems In: Annals of Eugenics, 7, p. 179—188. 1936. V. Venkatachalam, S. Selvan. Performance comparison of intrusion detection system classifiers using various feature reduction techniques. International journal of simulation, 2008 - Citeseer. T. Kohonen. “Self-organizing Maps”. Springer Series in Information Sciences. Volume 30, 1997. 2nd edition. Kohonen’s Self Organizing Feature Maps. http://www.ai-junkie.com/ann/som/som1.html. D. Phuc, M. Xuan. Using SOM based Graph Clustering for Extracting Main Ideas from Documents. Research, Innovation and Vision for the Future, 2008. RIVF 2008. IEEE International Conference on. p, 209 – 214. July 2008. I. Manolakos, E. Logaras. High throughput systolic SOM IP core for FPGAs. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. P, II61 - II-64. April 2007.G K. Yin, L. Gang. Fault Pattern Recognition of Thermodynamic System Based on SOM. Electrical and Control Engineering (ICECE), 2010. International Conference on. P, 3742 – 3745. June 2010. L. Min, W. Dongliang. Anormaly Intrusion Detection Based on SOM. Information Engineering, 2009. ICIE '09. WASE International Conference on. P, 40 – 43. July 2009. J.C. Patra, J. Abraham, P.K. Meher, G. Chakraborty. An Improved SOM-based Visualization Technique for DNA Microarray Data Analysis. Neural Networks (IJCNN), The 2010 International Joint Conference on. P, 1 – 7. July 2010. B. Fritzke. (1995). A growing neural gas network learns topologies. In Tesauro, G., Touretzky, D. S., and Leen, T. K., editors, Advances in Neural Information Processing Systems 7, pages 625–632. MIT Press, Cambridge MA. T. Martinez, K. Schulten, (1994). Topology representing networks. Neural Networks, 7(3):507–522. [28] A. Ocsa, C. Bedregal, E. Cuadros-Vargas, (2007). DB-GNG: A constructive selforganizing map based on density. In Proceedings of the International JointConference on Neural Networks (IJCNN07). IEEE. Y. Prudent, A. Ennaji. (2005). A k nearest classifier design. ELCVIA, 5(2):58–71. R. H. White. (1992). Competitive hebbian learning: algorithm and demonstrations. Neural Networks, 5(2):261–2. F. Mendoza, E. de la hoz, A. de la hoz, Application of feast (Feature Selection Toolbox) in IDS (Intrusion Detection Systems), vol.70, No.3, Journal of Theoretical and Applied Information Technology – JATIT, 2014, pp. 579-585. E. de la Hoz, E. de la Hoz, A. Ortiz, J. Ortega, Network anomaly detection with Bayesian self-organizing maps, in: Proceedings of the International Work-Conference on Artificial Neural Networks (IWANN), LNCS, vol. 7092, Springer-Verlag, 2013, pp. 532–537. E. de la Hoz, A. Ortiz, J. Ortega, E. de la Hoz. Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques, in: Proceedings of the International Conference on Hybrid Artificial Intelligence Systems (HAIS), LNAI, vol. 8073, Springer-Verlag, 2013, pp. 103–111. E. de la Hoz, E. de la Hoz, A. Ortiz, J. Ortega, A. Martínez-Álvarez, Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps, vol. 71, KnowledgeBased Systems, 2014, pp. 322-338. C. Guo et al. Efficient intrusion detection using representative instances, vol. 39, Computers & Security, 2013, pp. 255-267. R. K. Idowu et al. An Application of Membrane Computing to Anomaly-Based Intrusion Detection System, vol. 11, Procedia Technology, 2013, pp. 585–592. G.V. Nadiammai, M. Hemalatha. Effective approach toward Intrusion Detection System using data mining techniques, vol. 15, Egyptian Informatics Journal - Cairo University, 2014, pp. 37–50.PublicationORIGINALImplementation of an intrusion detection system based on self organizing map.pdfImplementation of an intrusion detection system based on self organizing map.pdfapplication/pdf587039https://repositorio.cuc.edu.co/bitstreams/6f1cd548-30d9-43b5-9e2b-057b87f4299f/downloadc86c8a26b162cd7c60b8489f4ea6af61MD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-81031https://repositorio.cuc.edu.co/bitstreams/f458590f-da7d-4d18-b1a4-d067031c4fb7/download934f4ca17e109e0a05eaeaba504d7ce4MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.cuc.edu.co/bitstreams/5639bcbe-6ef5-4adc-ba75-1d13b84b0ee3/download8a4605be74aa9ea9d79846c1fba20a33MD53THUMBNAILImplementation of an intrusion detection system based on self organizing map.pdf.jpgImplementation of an intrusion detection system based on self organizing map.pdf.jpgimage/jpeg70676https://repositorio.cuc.edu.co/bitstreams/b39f77f5-d905-4e5c-9fbb-44d4f1ad874e/download8ccc7e1a1617605ccaba7652e5d40c9bMD55TEXTImplementation of an intrusion detection system based on self organizing map.pdf.txtImplementation of an intrusion detection system based on self organizing map.pdf.txttext/plain36551https://repositorio.cuc.edu.co/bitstreams/947eb4c2-a720-427e-8ecb-15a303b0f896/downloade869872ca9d55f066042dea716bcc472MD5611323/3253oai:repositorio.cuc.edu.co:11323/32532024-09-17 14:10:03.366http://creativecommons.org/licenses/by-nc-sa/4.0/open.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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