Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS)
Con el pasar de los años, en el ámbito de la seguridad informática el problema de la intrusión se desarrolla cada día más, incrementando la existencia de programas que buscan afectar a computadoras tanto a nivel local como a toda una red informática. Esta dinámica lleva a entender los ataques y la m...
- Autores:
-
De la Hoz Correa, Eduardo Miguel
Ortiz, Andrés
Ortega, Julio
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2012
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/2660
- Acceso en línea:
- https://hdl.handle.net/11323/2660
https://repositorio.cuc.edu.co/
- Palabra clave:
- Seguridad informática
Sistemas de Detección de Intrusos (IDS)
NSL-KDD
GHSOM
Ataques
Computer security
Intrusion Detection Systems (IDS)
Attacks
- Rights
- openAccess
- License
- http://purl.org/coar/access_right/c_abf2
id |
RCUC2_e113e2e1363f2373caac64a5363ab9f8 |
---|---|
oai_identifier_str |
oai:repositorio.cuc.edu.co:11323/2660 |
network_acronym_str |
RCUC2 |
network_name_str |
REDICUC - Repositorio CUC |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) |
dc.title.translated.eng.fl_str_mv |
Application of GHSOM (Growing Hierarchical Self-Organizing Maps) to Intrusion Detection Systems (IDS) |
title |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) |
spellingShingle |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) Seguridad informática Sistemas de Detección de Intrusos (IDS) NSL-KDD GHSOM Ataques Computer security Intrusion Detection Systems (IDS) Attacks |
title_short |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) |
title_full |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) |
title_fullStr |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) |
title_full_unstemmed |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) |
title_sort |
Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS) |
dc.creator.fl_str_mv |
De la Hoz Correa, Eduardo Miguel Ortiz, Andrés Ortega, Julio |
dc.contributor.author.spa.fl_str_mv |
De la Hoz Correa, Eduardo Miguel Ortiz, Andrés Ortega, Julio |
dc.subject.spa.fl_str_mv |
Seguridad informática Sistemas de Detección de Intrusos (IDS) NSL-KDD GHSOM Ataques |
topic |
Seguridad informática Sistemas de Detección de Intrusos (IDS) NSL-KDD GHSOM Ataques Computer security Intrusion Detection Systems (IDS) Attacks |
dc.subject.eng.fl_str_mv |
Computer security Intrusion Detection Systems (IDS) Attacks |
description |
Con el pasar de los años, en el ámbito de la seguridad informática el problema de la intrusión se desarrolla cada día más, incrementando la existencia de programas que buscan afectar a computadoras tanto a nivel local como a toda una red informática. Esta dinámica lleva a entender los ataques y la mejor manera de contrarrestarlos, ya sea previniéndolos o detectándolos a tiempo, procurando que su impacto sea menor al esperado por el atacante. En este artículo se presenta una revisión de los ataques a sistemas informáticos, ahondando en los Sistemas de Detección de Intrusos (IDS) y en la implementación de técnicas de agrupamiento de datos —como las redes neuronales—, con el fin de encontrar métodos con altas precisiones en la detección de anomalías. Esta propuesta presenta la aplicación de GHSOM en IDS, utilizando el conjunto de datos NSL-KDD, y mostrando las mejoras encontradas en la detección de ataques en el proceso de búsqueda |
publishDate |
2012 |
dc.date.issued.none.fl_str_mv |
2012-10-31 |
dc.date.accessioned.none.fl_str_mv |
2019-02-21T00:33:10Z |
dc.date.available.none.fl_str_mv |
2019-02-21T00:33:10Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
acceptedVersion |
dc.identifier.citation.spa.fl_str_mv |
De la Hoz Correa, E., Ortiz, A., & Ortega, J. (2012). Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS). INGE CUC, 8(1), 117-148. Recuperado a partir de https://revistascientificas.cuc.edu.co/ingecuc/article/view/224 |
dc.identifier.issn.spa.fl_str_mv |
0122-6517, 2382-4700 electrónico |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/11323/2660 |
dc.identifier.eissn.spa.fl_str_mv |
2382-4700 |
dc.identifier.instname.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.identifier.pissn.spa.fl_str_mv |
0122-6517 |
dc.identifier.reponame.spa.fl_str_mv |
REDICUC - Repositorio CUC |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.cuc.edu.co/ |
identifier_str_mv |
De la Hoz Correa, E., Ortiz, A., & Ortega, J. (2012). Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS). INGE CUC, 8(1), 117-148. Recuperado a partir de https://revistascientificas.cuc.edu.co/ingecuc/article/view/224 0122-6517, 2382-4700 electrónico 2382-4700 Corporación Universidad de la Costa 0122-6517 REDICUC - Repositorio CUC |
url |
https://hdl.handle.net/11323/2660 https://repositorio.cuc.edu.co/ |
dc.language.iso.none.fl_str_mv |
spa |
language |
spa |
dc.relation.ispartofseries.spa.fl_str_mv |
INGE CUC; Vol. 8, Núm. 1 (2012) |
dc.relation.ispartofjournal.spa.fl_str_mv |
INGE CUC INGE CUC |
dc.relation.references.spa.fl_str_mv |
[1] Real Academia Española, Diccionario de la Lengua Española. [Online] Disponible en: http://lema.rae.es/drae/?val=seguridad [2] Real Academia Española, Diccionario de la Lengua Española. [Online] Disponible en: http://lema.rae.es/drae/?val=seguro [3] Real Academia Española, Diccionario de la Lengua Española: [Online] Disponible en: http://lema.rae.es/drae/?val=informat%C3%ADca [4] Asociación de Técnicos de Informática - ATI. Glosario básico inglés-español para usuarios de Internet, [Online] Disponible en: http://www.ati.es/novatica/glosario/glosario_internet.txt [5] A. Villalón Huerta, Seguridad en Unix y redes. [Online] Disponible en: http://www.rediris.es/cert/doc/unixsec/unixsec.pdf, pp. 6-7. 2002. [6] R. Heady, G. Luger, A. Maccabe and M. Servilla, The Architecture of a Network Level Intrusion Detection System. Technical report, Department of Computer Science, University of New Mexico, August 1990. [7] Fyodor, Network Mapping Tool [Online]. Disponible en: http://www.insecure.org/nmap [8] Institute for Internet Security [Online]. Disponible en: http://www.internet-sicherheit.de/en/research/recent-projects/internet-early-warning-systems/internetanalysis-system/recent-results/ [9] Guo, Fanglu, Jiawu Chen and Tzi cker Chiueh: Spoof Detection for Preventing DoSv Attacks against DNS Servers. In: 26th IEEE International Conference, pp. 37-39. 2006. [10] S. Kumar, Classification and Detection of Computer Intrusions. Tesis de Doctorado, Purdue University, 1995, citeseer.ist.psu.edu/kumar95classification.html [11] ComputerWire, DDoS Really, Really Tested UltraDNS. Informe técnico, [Online]. Disponible en: http://www.theregister.co.uk/2002/12/14/ddos_attack_really_really_tested/ attack really really tested, December 2002. [12] T. Olovsson, A Structured Approach to Computer Security. Informe técnico, Chalmers University of Technology, pp. 37-73. 1992. [13] A. Villalón Huerta, Seguridad en Unix y redes. [Online] Disponible en: http://www.rediris.es/cert/doc/unixsec/unixsec.pdf, pp. 11 - 12. 2002. [14] B. Daniel, OSSEC. [Online]. Disponible en: www.ossec.net, 2006. [15] Ch. Hosmer and M. Duren, “Detecting Subtle System Changes Using Digital Signatures”. En Information Technology Conference, IEEE. Laboratory at Purdue University, pp. 125-128, 1998. [16] M. Roesch, Lightweight Intrusion Detection for Networks. [Online]. Disponible en: http://www.snort.org, 2005. [17] O. Dain and R. Cunningham, Fusing Heterogeneous Alert Streams into Scenarios. Massachusetts Institute of Technology, September 2001. citeseer.ist.psu.edu/dain-01fusing.html [18] L. Girardin, “An Eye on Network Intruderadministrator Shootouts”. En Proceedings of the Workshop on Intrusion Detection and Network Monitoring (ID’99), Berkeley, CA, USA, 1999. USENIX Association. citeseer.ist.psu.edu/girardin99eye.html. pp. 19-28. [19] A. Siraj, R. B. Vaughn and S. M. Bridges, “Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture”. En Proceedings of the 37th Annual Hawaii International Conference, p. 10, 2004. [20] S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: A review”. Applied Soft Computing, 10(1), 1-35. doi: 10.1016/j.asoc.2009.06.019. 2010. [21] H. Debar, M. Dacier and A. Wespi, “A revised taxonomy for intrusion-detection systems”. IBM Research Technical Report, October 1999. [22] S. Axelsson, Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. 2000. [23] Networks, Enterasys, Intrusion Detection Methodologies Demystified. [Online]. Disponible en: http://www.enterasys.com/products/ids/whitepapers/, 2005. Ver también: S. Northcutt, Inside Network Perimeter Security: An Analyst Handbook. Ed. New Riders edición, 2003. pp. 125- 127. Ver también: R. Bace, ICSA: An Introduction to Intrusion Detection and Assessment. [Online]. Disponible en: http://www.icsalabs.com/html/communities/ids/whitepaper/Intrusion1.pdf, 2005. [24] S. Kumar and E. H. Spafford, “Software Architecture to Support Misuse Intrusion Detection”. En Proceedings of the 18th National Information Security Conference, pp. 194-204. 1995. [25] S. Watanabe, Pattern recognition: human and mechanical. John Wiley & Sons, Inc., New York, NY, USA. 1985. [26] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). pp. 264-323, 1999. [27] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). p. 30, 1999. [28] R. C. Dubes, Cluster analysis and related issues. 1993. [29] A. K. Jain and R. C. Dubes, Algorithms for clustering data. Prentice-Hall, Inc., Upper Saddle River, NJ, USA. 1988. [30] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). p. 278, 1999. [31] J. J. Hopfield, “Neural networks and physical systems with emergent properties”,Proceedingns of the National Academy of Sciences 79. pp. 2554-2558, 1982. [32] T. Kohonen, “Self-organized formation of topologically correct feature maps”. Biological Cybernetics, 43. pp. 59-69, 1982. [33] G. A. Carpenter and S. Grossberg, “The art of adaptive pattern recognition by a self-organizing neural network”. Computer, 21(3). pp. 77-78, 1988. [34] M. Dittenbach, D. Merkl and A. Rauber, “The Growing Hierarchical Self-Organizing Map”. In S: Amari, C. L. Giles, M. Gori and V. Puri (editors), Proc of the International Joint Conference on Neural Networks (IJCNN 2000), volume VI, Como, Italy. IEEE Computer Society. pp. 15-19, 2000. [35] B. Fritzke, “A growing neural gas network learns topologies”. In G. Tesauro, D. S. Touretzky and T. K. Leen (editors), Advances in Neural Information Processing Systems 7. MIT Press, Cambridge MA. pp. 625-632, 1995. [36] J. Blackmore and R. Miikkulainen, “Incremental grid growing: Encoding highdimensional structure into a two-dimensional feature map”. In Proceedings of the International Conference on Neural Networks ICNN93, volume I. Piscataway, NJ. IEEE Service Center. pp. 450-455, 1993. [37] D. Alahakoon, S. K. Halgamuge and B. Srinivasan, “A structure adapting feature map for optimal cluster representation”. In International Conference on Neural Information Processing ICONIP98. pp. 809- 812, 1998. [38] A. Ocsa, C. Bedregal and E. Cuadros-Vargas, “DB-GNG: A constructive self-organizing map based on density”. In Proceedings of the International Joint Conference on Neural Networks (IJCNN07). IEEE, 2007. [39] A. K. Jain, J. Mao and K. M. Mohiuddin, Artificial neural networks: A tutorial. IEEE Computer, 29(3):31-44, 1996. [40] T. Kohonen, Self-Organizing Maps, 3ra Edición, Springer-Verlag, p. 86, 2001. [41] T. Kohonen, Self-Organizing Maps, 3ra Edición, Springer-Verlag, 2001. [42] T. Kohonen, “The Self-Organizing Maps”. Proceedings of the IEE, Vol. 78, No. 9, September 1990, p. 1467. [43] T. Kohonen, Self-Organizing Maps. Springer, Berlin, 1995. [44] Imagen disponible en Internet: http://www.peltarion.com/doc/images/SOM_Unified_distance_matrix.gif [45] M. Dittenbach, D. Merkl and A. Rauber, “The Growing Hierarchical Self-Organizing Map”. In S. Amari, C. L. Giles, M. Gori and V. Puri, (editors), Proc of the International Joint Conference on Neural Networks (IJCNN 2000), volume VI, Como, Italy. IEEE Computer Society. pp. 199-216, 2000. [46] S. P. Luttrell, “Hierarchical self-organizing networks”. In Proceedings of the International Conference on Neural Networks (ICANN’89). London, U.K. pp. 2-6, 1989. [47] G. R. Zargar and P. Kabiri, “Selection of Effective Network Parameters in Attacks for Intrussion Detection”. In: IEEE International Conference on Data Mining. 2010. [48] E. J. Palomo, E. Domínguez, R. M. Luque And J. Muñoz, “Network security using growing hierarchical self-organizing maps”. In: M. Kolehmainen, P. Toivanen, and B. Beliczynski (eds.) ICANNGA 2009. LNCS, vol. 5495. Springer, Heidelberg. pp. 130-139, 2009. [49] R. Datti and B. Verma, “Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis”. International Journal on Engineering Science and Technology 2(4). pp. 1072-1078, 2010. [50] S. Mukkamala and A. H. Sung, “Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines”. In: Proceedings of the Second Digital Forensic Research Workshop. 2002. [51] A. Ortiz, J. Ortega, A. Martínez and A. Prieto, “Intrusion detection and prevention by using Hierarchical Selforganizing Maps and Multiobjective-based feature selection”. International Journal on Neural System. pp. 232-239, 2011. |
dc.relation.ispartofjournalabbrev.spa.fl_str_mv |
INGE CUC |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.source.spa.fl_str_mv |
INGE CUC |
institution |
Corporación Universidad de la Costa |
dc.source.url.spa.fl_str_mv |
https://revistascientificas.cuc.edu.co/ingecuc/article/view/224 |
bitstream.url.fl_str_mv |
https://repositorio.cuc.edu.co/bitstreams/739e5105-ff49-4aac-83bc-4721a5d84a95/download https://repositorio.cuc.edu.co/bitstreams/b7f5fb1a-b3b6-4d81-a1e8-a99ace62fc66/download https://repositorio.cuc.edu.co/bitstreams/7011759e-ac8b-43e0-b093-58b3b2b82c63/download https://repositorio.cuc.edu.co/bitstreams/5250f1ca-0c15-4071-a3c8-78ea00151afb/download |
bitstream.checksum.fl_str_mv |
38f17175da85982aadf2b910d7a0f659 8a4605be74aa9ea9d79846c1fba20a33 3e0187209b414c05db709a2e319e199d 6518abc0a9580ff8d147ba0953285509 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio de la Universidad de la Costa CUC |
repository.mail.fl_str_mv |
repdigital@cuc.edu.co |
_version_ |
1811760794384203776 |
spelling |
De la Hoz Correa, Eduardo MiguelOrtiz, AndrésOrtega, Julio2019-02-21T00:33:10Z2019-02-21T00:33:10Z2012-10-31De la Hoz Correa, E., Ortiz, A., & Ortega, J. (2012). Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS). INGE CUC, 8(1), 117-148. Recuperado a partir de https://revistascientificas.cuc.edu.co/ingecuc/article/view/2240122-6517, 2382-4700 electrónicohttps://hdl.handle.net/11323/26602382-4700Corporación Universidad de la Costa0122-6517REDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/Con el pasar de los años, en el ámbito de la seguridad informática el problema de la intrusión se desarrolla cada día más, incrementando la existencia de programas que buscan afectar a computadoras tanto a nivel local como a toda una red informática. Esta dinámica lleva a entender los ataques y la mejor manera de contrarrestarlos, ya sea previniéndolos o detectándolos a tiempo, procurando que su impacto sea menor al esperado por el atacante. En este artículo se presenta una revisión de los ataques a sistemas informáticos, ahondando en los Sistemas de Detección de Intrusos (IDS) y en la implementación de técnicas de agrupamiento de datos —como las redes neuronales—, con el fin de encontrar métodos con altas precisiones en la detección de anomalías. Esta propuesta presenta la aplicación de GHSOM en IDS, utilizando el conjunto de datos NSL-KDD, y mostrando las mejoras encontradas en la detección de ataques en el proceso de búsquedaAs time passes by, in the field of computer security, intrusion problems grow every day increasing the existence of programs that seek to affect computers both locally and across a network. This dynamic has led to an imminent need of understanding the attacks and find-ing the best way to counteract them either by preventing them or by detecting them on time, diminishing the impact expected by the attacker. This article presents a review of attacks on computer systems, delving into the Intrusion Detection System (IDS) and the implementation of data clustering techniques like neural networks in order to find high accuracy methods for anomaly detection. This proposal presents GHSOM for IDS using NSL-KDD dataset, and illustrates attack detection improvement in the search processDe la Hoz Correa, Eduardo MiguelOrtiz, AndrésOrtega, Julioapplication/pdfspaCorporación Universidad de la CostaINGE CUC; Vol. 8, Núm. 1 (2012)INGE CUCINGE CUC[1] Real Academia Española, Diccionario de la Lengua Española. [Online] Disponible en: http://lema.rae.es/drae/?val=seguridad[2] Real Academia Española, Diccionario de la Lengua Española. [Online] Disponible en: http://lema.rae.es/drae/?val=seguro[3] Real Academia Española, Diccionario de la Lengua Española: [Online] Disponible en: http://lema.rae.es/drae/?val=informat%C3%ADca[4] Asociación de Técnicos de Informática - ATI. Glosario básico inglés-español para usuarios de Internet, [Online] Disponible en: http://www.ati.es/novatica/glosario/glosario_internet.txt[5] A. Villalón Huerta, Seguridad en Unix y redes. [Online] Disponible en: http://www.rediris.es/cert/doc/unixsec/unixsec.pdf, pp. 6-7. 2002.[6] R. Heady, G. Luger, A. Maccabe and M. Servilla, The Architecture of a Network Level Intrusion Detection System. Technical report, Department of Computer Science, University of New Mexico, August 1990.[7] Fyodor, Network Mapping Tool [Online]. Disponible en: http://www.insecure.org/nmap[8] Institute for Internet Security [Online]. Disponible en: http://www.internet-sicherheit.de/en/research/recent-projects/internet-early-warning-systems/internetanalysis-system/recent-results/[9] Guo, Fanglu, Jiawu Chen and Tzi cker Chiueh: Spoof Detection for Preventing DoSv Attacks against DNS Servers. In: 26th IEEE International Conference, pp. 37-39. 2006.[10] S. Kumar, Classification and Detection of Computer Intrusions. Tesis de Doctorado, Purdue University, 1995, citeseer.ist.psu.edu/kumar95classification.html[11] ComputerWire, DDoS Really, Really Tested UltraDNS. Informe técnico, [Online]. Disponible en: http://www.theregister.co.uk/2002/12/14/ddos_attack_really_really_tested/ attack really really tested, December 2002.[12] T. Olovsson, A Structured Approach to Computer Security. Informe técnico, Chalmers University of Technology, pp. 37-73. 1992.[13] A. Villalón Huerta, Seguridad en Unix y redes. [Online] Disponible en: http://www.rediris.es/cert/doc/unixsec/unixsec.pdf, pp. 11 - 12. 2002.[14] B. Daniel, OSSEC. [Online]. Disponible en: www.ossec.net, 2006.[15] Ch. Hosmer and M. Duren, “Detecting Subtle System Changes Using Digital Signatures”. En Information Technology Conference, IEEE. Laboratory at Purdue University, pp. 125-128, 1998.[16] M. Roesch, Lightweight Intrusion Detection for Networks. [Online]. Disponible en: http://www.snort.org, 2005.[17] O. Dain and R. Cunningham, Fusing Heterogeneous Alert Streams into Scenarios. Massachusetts Institute of Technology, September 2001. citeseer.ist.psu.edu/dain-01fusing.html[18] L. Girardin, “An Eye on Network Intruderadministrator Shootouts”. En Proceedings of the Workshop on Intrusion Detection and Network Monitoring (ID’99), Berkeley, CA, USA, 1999. USENIX Association. citeseer.ist.psu.edu/girardin99eye.html. pp. 19-28.[19] A. Siraj, R. B. Vaughn and S. M. Bridges, “Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture”. En Proceedings of the 37th Annual Hawaii International Conference, p. 10, 2004.[20] S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: A review”. Applied Soft Computing, 10(1), 1-35. doi: 10.1016/j.asoc.2009.06.019. 2010.[21] H. Debar, M. Dacier and A. Wespi, “A revised taxonomy for intrusion-detection systems”. IBM Research Technical Report, October 1999.[22] S. Axelsson, Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. 2000.[23] Networks, Enterasys, Intrusion Detection Methodologies Demystified. [Online]. Disponible en: http://www.enterasys.com/products/ids/whitepapers/, 2005. Ver también: S. Northcutt, Inside Network Perimeter Security: An Analyst Handbook. Ed. New Riders edición, 2003. pp. 125- 127. Ver también: R. Bace, ICSA: An Introduction to Intrusion Detection and Assessment. [Online]. Disponible en: http://www.icsalabs.com/html/communities/ids/whitepaper/Intrusion1.pdf, 2005.[24] S. Kumar and E. H. Spafford, “Software Architecture to Support Misuse Intrusion Detection”. En Proceedings of the 18th National Information Security Conference, pp. 194-204. 1995.[25] S. Watanabe, Pattern recognition: human and mechanical. John Wiley & Sons, Inc., New York, NY, USA. 1985.[26] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). pp. 264-323, 1999.[27] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). p. 30, 1999.[28] R. C. Dubes, Cluster analysis and related issues. 1993.[29] A. K. Jain and R. C. Dubes, Algorithms for clustering data. Prentice-Hall, Inc., Upper Saddle River, NJ, USA. 1988.[30] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). p. 278, 1999.[31] J. J. Hopfield, “Neural networks and physical systems with emergent properties”,Proceedingns of the National Academy of Sciences 79. pp. 2554-2558, 1982.[32] T. Kohonen, “Self-organized formation of topologically correct feature maps”. Biological Cybernetics, 43. pp. 59-69, 1982.[33] G. A. Carpenter and S. Grossberg, “The art of adaptive pattern recognition by a self-organizing neural network”. Computer, 21(3). pp. 77-78, 1988.[34] M. Dittenbach, D. Merkl and A. Rauber, “The Growing Hierarchical Self-Organizing Map”. In S: Amari, C. L. Giles, M. Gori and V. Puri (editors), Proc of the International Joint Conference on Neural Networks (IJCNN 2000), volume VI, Como, Italy. IEEE Computer Society. pp. 15-19, 2000.[35] B. Fritzke, “A growing neural gas network learns topologies”. In G. Tesauro, D. S. Touretzky and T. K. Leen (editors), Advances in Neural Information Processing Systems 7. MIT Press, Cambridge MA. pp. 625-632, 1995.[36] J. Blackmore and R. Miikkulainen, “Incremental grid growing: Encoding highdimensional structure into a two-dimensional feature map”. In Proceedings of the International Conference on Neural Networks ICNN93, volume I. Piscataway, NJ. IEEE Service Center. pp. 450-455, 1993.[37] D. Alahakoon, S. K. Halgamuge and B. Srinivasan, “A structure adapting feature map for optimal cluster representation”. In International Conference on Neural Information Processing ICONIP98. pp. 809- 812, 1998.[38] A. Ocsa, C. Bedregal and E. Cuadros-Vargas, “DB-GNG: A constructive self-organizing map based on density”. In Proceedings of the International Joint Conference on Neural Networks (IJCNN07). IEEE, 2007.[39] A. K. Jain, J. Mao and K. M. Mohiuddin, Artificial neural networks: A tutorial. IEEE Computer, 29(3):31-44, 1996.[40] T. Kohonen, Self-Organizing Maps, 3ra Edición, Springer-Verlag, p. 86, 2001.[41] T. Kohonen, Self-Organizing Maps, 3ra Edición, Springer-Verlag, 2001.[42] T. Kohonen, “The Self-Organizing Maps”. Proceedings of the IEE, Vol. 78, No. 9, September 1990, p. 1467.[43] T. Kohonen, Self-Organizing Maps. Springer, Berlin, 1995.[44] Imagen disponible en Internet: http://www.peltarion.com/doc/images/SOM_Unified_distance_matrix.gif[45] M. Dittenbach, D. Merkl and A. Rauber, “The Growing Hierarchical Self-Organizing Map”. In S. Amari, C. L. Giles, M. Gori and V. Puri, (editors), Proc of the International Joint Conference on Neural Networks (IJCNN 2000), volume VI, Como, Italy. IEEE Computer Society. pp. 199-216, 2000.[46] S. P. Luttrell, “Hierarchical self-organizing networks”. In Proceedings of the International Conference on Neural Networks (ICANN’89). London, U.K. pp. 2-6, 1989.[47] G. R. Zargar and P. Kabiri, “Selection of Effective Network Parameters in Attacks for Intrussion Detection”. In: IEEE International Conference on Data Mining. 2010.[48] E. J. Palomo, E. Domínguez, R. M. Luque And J. Muñoz, “Network security using growing hierarchical self-organizing maps”. In: M. Kolehmainen, P. Toivanen, and B. Beliczynski (eds.) ICANNGA 2009. LNCS, vol. 5495. Springer, Heidelberg. pp. 130-139, 2009.[49] R. Datti and B. Verma, “Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis”. International Journal on Engineering Science and Technology 2(4). pp. 1072-1078, 2010.[50] S. Mukkamala and A. H. Sung, “Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines”. In: Proceedings of the Second Digital Forensic Research Workshop. 2002.[51] A. Ortiz, J. Ortega, A. Martínez and A. Prieto, “Intrusion detection and prevention by using Hierarchical Selforganizing Maps and Multiobjective-based feature selection”. International Journal on Neural System. pp. 232-239, 2011.INGE CUCINGE CUChttps://revistascientificas.cuc.edu.co/ingecuc/article/view/224Seguridad informáticaSistemas de Detección de Intrusos (IDS)NSL-KDDGHSOMAtaquesComputer securityIntrusion Detection Systems (IDS)AttacksAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS)Application of GHSOM (Growing Hierarchical Self-Organizing Maps) to Intrusion Detection Systems (IDS)Artículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersioninfo:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2PublicationORIGINALAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS).pdfAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS).pdfapplication/pdf1642893https://repositorio.cuc.edu.co/bitstreams/739e5105-ff49-4aac-83bc-4721a5d84a95/download38f17175da85982aadf2b910d7a0f659MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.cuc.edu.co/bitstreams/b7f5fb1a-b3b6-4d81-a1e8-a99ace62fc66/download8a4605be74aa9ea9d79846c1fba20a33MD52THUMBNAILAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS).pdf.jpgAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS).pdf.jpgimage/jpeg40040https://repositorio.cuc.edu.co/bitstreams/7011759e-ac8b-43e0-b093-58b3b2b82c63/download3e0187209b414c05db709a2e319e199dMD54TEXTAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS).pdf.txtAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS).pdf.txttext/plain84529https://repositorio.cuc.edu.co/bitstreams/5250f1ca-0c15-4071-a3c8-78ea00151afb/download6518abc0a9580ff8d147ba0953285509MD5511323/2660oai:repositorio.cuc.edu.co:11323/26602024-09-17 12:44:10.072open.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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 |