ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

نویسندگان

  • V. Alarcon-Aquino
  • J. M. Ramirez-Cortes
  • P. Gomez-Gil
  • O. Starostenko
  • Y. Garcia-Gonzalez
چکیده

In this paper we report a novel application-based model as a suitable alternative for the classification and identification of attacks on a computer network, and thus guarantee its safety from HTTP protocol-based malicious commands. The proposed model is built on a self-recurrent neural network architecture based on wavelets with multidimensional radial wavelons, and is therefore suited to work online by analyzing non-linear patterns in real time to self-adjust to changes in its input environment. Six different neural network based systems have been modeled and simulated for comparison purposes in terms of overall performance, namely, a feed-forward neural network, an Elman network, a fully connected recurrent neural network, a recurrent neural network based on wavelets, a self-recurrent wavelet network and the proposed self-recurrent wavelet network with multidimensional radial wavelons. Within the models studied, this paper presents two recurrent architectures which use wavelet functions in their functionality in very distinct ways. The results confirm that recurrent architectures using wavelets obtain superior performance than their peers, in terms not only of the identification and classification of attacks, but also the speed of convergence.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

This paper describes a new two-task approach for extracting the centerline from simple 2D polygons. An algorithm of the first task, which generates a set of points for future centerline, is presented. The idea of the algorithm is to use the polygon hatching by parallel lines and creating paths from its middle points in different polygon rotations. The centerline is derived from the intersection...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

Abstract. In this work, we investigate a multi-risk model describing insurance business with two or more independent series of claim amounts. Each series of claim amounts consists of independent nonnegative random variables. Claims of each series occur periodically with some fixed inter-arrival time. Claim amounts occur until they can be compensated by a common premium rate and the initial insu...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

Speech recognition is one of the fundamental requirements for fully autonomous robotic systems nowadays. The objective of the presented work is to offer a smartphone based speech recognition system for ROS (Robot Operating System) based autonomous robotic systems. The proposed recognition process consists of three steps, namely acquisition, preprocessing, and result extraction. In the contribut...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. Having motivated, we first define a forma...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

Certificate-based signature (CBS) is an attractive paradigm since it simultaneously solves the certificate revocation problem in conventional signatures and the key escrow problem in ID-based signatures. In particular, short certificate-based signatures are useful in bandwidth reduction for communication due to their short signature lengths. However, it is still a challenging and open problem t...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

We studied outlier document filtering (ODF) for extractive sentence summarization. Our results are superior compared to the average of the participant systems’ using DUC 2006. Furthermore, we add extractive paragraph summarization to the same system. It is surprising that the results are nearly the same for ROUGE metrics. Although extractive paragraph summarization has a better performance for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014