Mostrar el registro sencillo del ítem

dc.contributor.authorDe la Hoz Correa, Eduardo Miguelspa
dc.contributor.authorOrtiz, Andrésspa
dc.contributor.authorOrtega, Juliospa
dc.date.accessioned2019-02-21T00:33:10Z
dc.date.available2019-02-21T00:33:10Z
dc.date.issued2012-10-31
dc.identifier.citationDe la Hoz Correa, E., Ortiz, A., & Ortega, J. (2012). Aplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS). INGE CUC, 8(1), 117-148. Recuperado a partir de https://revistascientificas.cuc.edu.co/ingecuc/article/view/224spa
dc.identifier.issn0122-6517, 2382-4700 electrónicospa
dc.identifier.urihttp://hdl.handle.net/11323/2660spa
dc.description.abstractCon el pasar de los años, en el ámbito de la seguridad informática el problema de la intrusión se desarrolla cada día más, incrementando la existencia de programas que buscan afectar a computadoras tanto a nivel local como a toda una red informática. Esta dinámica lleva a entender los ataques y la mejor manera de contrarrestarlos, ya sea previniéndolos o detectándolos a tiempo, procurando que su impacto sea menor al esperado por el atacante. En este artículo se presenta una revisión de los ataques a sistemas informáticos, ahondando en los Sistemas de Detección de Intrusos (IDS) y en la implementación de técnicas de agrupamiento de datos —como las redes neuronales—, con el fin de encontrar métodos con altas precisiones en la detección de anomalías. Esta propuesta presenta la aplicación de GHSOM en IDS, utilizando el conjunto de datos NSL-KDD, y mostrando las mejoras encontradas en la detección de ataques en el proceso de búsquedaspa
dc.description.abstractAs time passes by, in the field of computer security, intrusion problems grow every day increasing the existence of programs that seek to affect computers both locally and across a network. This dynamic has led to an imminent need of understanding the attacks and find-ing the best way to counteract them either by preventing them or by detecting them on time, diminishing the impact expected by the attacker. This article presents a review of attacks on computer systems, delving into the Intrusion Detection System (IDS) and the implementation of data clustering techniques like neural networks in order to find high accuracy methods for anomaly detection. This proposal presents GHSOM for IDS using NSL-KDD dataset, and illustrates attack detection improvement in the search processeng
dc.format.mimetypeapplication/pdfspa
dc.language.isospa
dc.publisherCorporación Universidad de la Costaspa
dc.relation.ispartofseriesINGE CUC; Vol. 8, Núm. 1 (2012)spa
dc.sourceINGE CUCspa
dc.subjectSeguridad informáticaspa
dc.subjectSistemas de Detección de Intrusos (IDS)spa
dc.subjectNSL-KDDspa
dc.subjectGHSOMspa
dc.subjectAtaquesspa
dc.subjectComputer securityeng
dc.subjectIntrusion Detection Systems (IDS)eng
dc.subjectAttackseng
dc.titleAplicación de GHSOM (Growing Hierarchical Self-Organizing Maps) a sistemas de detección de intrusos (IDS)spa
dc.typeArtículo de revistaspa
dc.source.urlhttps://revistascientificas.cuc.edu.co/ingecuc/article/view/224spa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.identifier.eissn2382-4700spa
dc.identifier.instnameCorporación Universidad de la Costaspa
dc.identifier.pissn0122-6517spa
dc.identifier.reponameREDICUC - Repositorio CUCspa
dc.identifier.repourlhttps://repositorio.cuc.edu.co/spa
dc.relation.ispartofjournalINGE CUCspa
dc.relation.ispartofjournalINGE CUCspa
dc.relation.references[1] Real Academia Española, Diccionario de la Lengua Española. [Online] Disponible en: http://lema.rae.es/drae/?val=seguridadspa
dc.relation.references[2] Real Academia Española, Diccionario de la Lengua Española. [Online] Disponible en: http://lema.rae.es/drae/?val=segurospa
dc.relation.references[3] Real Academia Española, Diccionario de la Lengua Española: [Online] Disponible en: http://lema.rae.es/drae/?val=informat%C3%ADcaspa
dc.relation.references[4] Asociación de Técnicos de Informática - ATI. Glosario básico inglés-español para usuarios de Internet, [Online] Disponible en: http://www.ati.es/novatica/glosario/glosario_internet.txtspa
dc.relation.references[5] A. Villalón Huerta, Seguridad en Unix y redes. [Online] Disponible en: http://www.rediris.es/cert/doc/unixsec/unixsec.pdf, pp. 6-7. 2002.spa
dc.relation.references[6] R. Heady, G. Luger, A. Maccabe and M. Servilla, The Architecture of a Network Level Intrusion Detection System. Technical report, Department of Computer Science, University of New Mexico, August 1990.spa
dc.relation.references[7] Fyodor, Network Mapping Tool [Online]. Disponible en: http://www.insecure.org/nmapspa
dc.relation.references[8] Institute for Internet Security [Online]. Disponible en: http://www.internet-sicherheit.de/en/research/recent-projects/internet-early-warning-systems/internetanalysis-system/recent-results/spa
dc.relation.references[9] Guo, Fanglu, Jiawu Chen and Tzi cker Chiueh: Spoof Detection for Preventing DoSv Attacks against DNS Servers. In: 26th IEEE International Conference, pp. 37-39. 2006.spa
dc.relation.references[10] S. Kumar, Classification and Detection of Computer Intrusions. Tesis de Doctorado, Purdue University, 1995, citeseer.ist.psu.edu/kumar95classification.htmlspa
dc.relation.references[11] ComputerWire, DDoS Really, Really Tested UltraDNS. Informe técnico, [Online]. Disponible en: http://www.theregister.co.uk/2002/12/14/ddos_attack_really_really_tested/ attack really really tested, December 2002.spa
dc.relation.references[12] T. Olovsson, A Structured Approach to Computer Security. Informe técnico, Chalmers University of Technology, pp. 37-73. 1992.spa
dc.relation.references[13] A. Villalón Huerta, Seguridad en Unix y redes. [Online] Disponible en: http://www.rediris.es/cert/doc/unixsec/unixsec.pdf, pp. 11 - 12. 2002.spa
dc.relation.references[14] B. Daniel, OSSEC. [Online]. Disponible en: www.ossec.net, 2006.spa
dc.relation.references[15] Ch. Hosmer and M. Duren, “Detecting Subtle System Changes Using Digital Signatures”. En Information Technology Conference, IEEE. Laboratory at Purdue University, pp. 125-128, 1998.spa
dc.relation.references[16] M. Roesch, Lightweight Intrusion Detection for Networks. [Online]. Disponible en: http://www.snort.org, 2005.spa
dc.relation.references[17] O. Dain and R. Cunningham, Fusing Heterogeneous Alert Streams into Scenarios. Massachusetts Institute of Technology, September 2001. citeseer.ist.psu.edu/dain-01fusing.htmlspa
dc.relation.references[18] L. Girardin, “An Eye on Network Intruderadministrator Shootouts”. En Proceedings of the Workshop on Intrusion Detection and Network Monitoring (ID’99), Berkeley, CA, USA, 1999. USENIX Association. citeseer.ist.psu.edu/girardin99eye.html. pp. 19-28.spa
dc.relation.references[19] A. Siraj, R. B. Vaughn and S. M. Bridges, “Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture”. En Proceedings of the 37th Annual Hawaii International Conference, p. 10, 2004.spa
dc.relation.references[20] S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: A review”. Applied Soft Computing, 10(1), 1-35. doi: 10.1016/j.asoc.2009.06.019. 2010.spa
dc.relation.references[21] H. Debar, M. Dacier and A. Wespi, “A revised taxonomy for intrusion-detection systems”. IBM Research Technical Report, October 1999.spa
dc.relation.references[22] S. Axelsson, Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. 2000.spa
dc.relation.references[23] Networks, Enterasys, Intrusion Detection Methodologies Demystified. [Online]. Disponible en: http://www.enterasys.com/products/ids/whitepapers/, 2005. Ver también: S. Northcutt, Inside Network Perimeter Security: An Analyst Handbook. Ed. New Riders edición, 2003. pp. 125- 127. Ver también: R. Bace, ICSA: An Introduction to Intrusion Detection and Assessment. [Online]. Disponible en: http://www.icsalabs.com/html/communities/ids/whitepaper/Intrusion1.pdf, 2005.spa
dc.relation.references[24] S. Kumar and E. H. Spafford, “Software Architecture to Support Misuse Intrusion Detection”. En Proceedings of the 18th National Information Security Conference, pp. 194-204. 1995.spa
dc.relation.references[25] S. Watanabe, Pattern recognition: human and mechanical. John Wiley & Sons, Inc., New York, NY, USA. 1985.spa
dc.relation.references[26] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). pp. 264-323, 1999.spa
dc.relation.references[27] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). p. 30, 1999.spa
dc.relation.references[28] R. C. Dubes, Cluster analysis and related issues. 1993.spa
dc.relation.references[29] A. K. Jain and R. C. Dubes, Algorithms for clustering data. Prentice-Hall, Inc., Upper Saddle River, NJ, USA. 1988.spa
dc.relation.references[30] A. K. Jain, M. Ñ. Murty and P. J. Flynn, “Data clustering: a review”. ACM Computing Surveys, 31(3). p. 278, 1999.spa
dc.relation.references[31] J. J. Hopfield, “Neural networks and physical systems with emergent properties”,Proceedingns of the National Academy of Sciences 79. pp. 2554-2558, 1982.spa
dc.relation.references[32] T. Kohonen, “Self-organized formation of topologically correct feature maps”. Biological Cybernetics, 43. pp. 59-69, 1982.spa
dc.relation.references[33] G. A. Carpenter and S. Grossberg, “The art of adaptive pattern recognition by a self-organizing neural network”. Computer, 21(3). pp. 77-78, 1988.spa
dc.relation.references[34] M. Dittenbach, D. Merkl and A. Rauber, “The Growing Hierarchical Self-Organizing Map”. In S: Amari, C. L. Giles, M. Gori and V. Puri (editors), Proc of the International Joint Conference on Neural Networks (IJCNN 2000), volume VI, Como, Italy. IEEE Computer Society. pp. 15-19, 2000.spa
dc.relation.references[35] B. Fritzke, “A growing neural gas network learns topologies”. In G. Tesauro, D. S. Touretzky and T. K. Leen (editors), Advances in Neural Information Processing Systems 7. MIT Press, Cambridge MA. pp. 625-632, 1995.spa
dc.relation.references[36] J. Blackmore and R. Miikkulainen, “Incremental grid growing: Encoding highdimensional structure into a two-dimensional feature map”. In Proceedings of the International Conference on Neural Networks ICNN93, volume I. Piscataway, NJ. IEEE Service Center. pp. 450-455, 1993.spa
dc.relation.references[37] D. Alahakoon, S. K. Halgamuge and B. Srinivasan, “A structure adapting feature map for optimal cluster representation”. In International Conference on Neural Information Processing ICONIP98. pp. 809- 812, 1998.spa
dc.relation.references[38] A. Ocsa, C. Bedregal and E. Cuadros-Vargas, “DB-GNG: A constructive self-organizing map based on density”. In Proceedings of the International Joint Conference on Neural Networks (IJCNN07). IEEE, 2007.spa
dc.relation.references[39] A. K. Jain, J. Mao and K. M. Mohiuddin, Artificial neural networks: A tutorial. IEEE Computer, 29(3):31-44, 1996.spa
dc.relation.references[40] T. Kohonen, Self-Organizing Maps, 3ra Edición, Springer-Verlag, p. 86, 2001.spa
dc.relation.references[41] T. Kohonen, Self-Organizing Maps, 3ra Edición, Springer-Verlag, 2001.spa
dc.relation.references[42] T. Kohonen, “The Self-Organizing Maps”. Proceedings of the IEE, Vol. 78, No. 9, September 1990, p. 1467.spa
dc.relation.references[43] T. Kohonen, Self-Organizing Maps. Springer, Berlin, 1995.spa
dc.relation.references[44] Imagen disponible en Internet: http://www.peltarion.com/doc/images/SOM_Unified_distance_matrix.gifspa
dc.relation.references[45] M. Dittenbach, D. Merkl and A. Rauber, “The Growing Hierarchical Self-Organizing Map”. In S. Amari, C. L. Giles, M. Gori and V. Puri, (editors), Proc of the International Joint Conference on Neural Networks (IJCNN 2000), volume VI, Como, Italy. IEEE Computer Society. pp. 199-216, 2000.spa
dc.relation.references[46] S. P. Luttrell, “Hierarchical self-organizing networks”. In Proceedings of the International Conference on Neural Networks (ICANN’89). London, U.K. pp. 2-6, 1989.spa
dc.relation.references[47] G. R. Zargar and P. Kabiri, “Selection of Effective Network Parameters in Attacks for Intrussion Detection”. In: IEEE International Conference on Data Mining. 2010.spa
dc.relation.references[48] E. J. Palomo, E. Domínguez, R. M. Luque And J. Muñoz, “Network security using growing hierarchical self-organizing maps”. In: M. Kolehmainen, P. Toivanen, and B. Beliczynski (eds.) ICANNGA 2009. LNCS, vol. 5495. Springer, Heidelberg. pp. 130-139, 2009.spa
dc.relation.references[49] R. Datti and B. Verma, “Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis”. International Journal on Engineering Science and Technology 2(4). pp. 1072-1078, 2010.spa
dc.relation.references[50] S. Mukkamala and A. H. Sung, “Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines”. In: Proceedings of the Second Digital Forensic Research Workshop. 2002.spa
dc.relation.references[51] A. Ortiz, J. Ortega, A. Martínez and A. Prieto, “Intrusion detection and prevention by using Hierarchical Selforganizing Maps and Multiobjective-based feature selection”. International Journal on Neural System. pp. 232-239, 2011.spa
dc.title.translatedApplication of GHSOM (Growing Hierarchical Self-Organizing Maps) to Intrusion Detection Systems (IDS)eng
dc.type.coarhttp://purl.org/coar/resource_type/c_6501spa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.redcolhttp://purl.org/redcol/resource_type/ARTspa
dc.type.versioninfo:eu-repo/semantics/acceptedVersionspa
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aaspa
dc.rights.coarhttp://purl.org/coar/access_right/c_abf2spa
dc.relation.ispartofjournalabbrevINGE CUCspa


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

  • Revistas Científicas [1682]
    Artículos de investigación publicados en revistas pertenecientes a la Editorial EDUCOSTA.

Mostrar el registro sencillo del ítem