A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection
Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Or...
Ausführliche Beschreibung
Autor*in: |
Qu, Xiaofei [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
Hierarchical self-organizing map (HSOM) |
---|
Anmerkung: |
© Springer Science+Business Media, LLC, part of Springer Nature 2019 |
---|
Übergeordnetes Werk: |
Enthalten in: Mobile networks and applications - Springer US, 1996, 26(2019), 2 vom: 02. Okt., Seite 808-829 |
---|---|
Übergeordnetes Werk: |
volume:26 ; year:2019 ; number:2 ; day:02 ; month:10 ; pages:808-829 |
Links: |
---|
DOI / URN: |
10.1007/s11036-019-01353-0 |
---|
Katalog-ID: |
OLC2125370654 |
---|
LEADER | 01000naa a22002652 4500 | ||
---|---|---|---|
001 | OLC2125370654 | ||
003 | DE-627 | ||
005 | 20230505102001.0 | ||
007 | tu | ||
008 | 230505s2019 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11036-019-01353-0 |2 doi | |
035 | |a (DE-627)OLC2125370654 | ||
035 | |a (DE-He213)s11036-019-01353-0-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q VZ |
100 | 1 | |a Qu, Xiaofei |e verfasserin |4 aut | |
245 | 1 | 0 | |a A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media, LLC, part of Springer Nature 2019 | ||
520 | |a Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. | ||
650 | 4 | |a Self organizing map (SOM) | |
650 | 4 | |a Hierarchical self-organizing map (HSOM) | |
650 | 4 | |a Growing hierarchical self-organizing map (GHSOM) | |
650 | 4 | |a Intrusion detection system (IDS) | |
700 | 1 | |a Yang, Lin |4 aut | |
700 | 1 | |a Guo, Kai |4 aut | |
700 | 1 | |a Ma, Linru |4 aut | |
700 | 1 | |a Sun, Meng |4 aut | |
700 | 1 | |a Ke, Mingxing |4 aut | |
700 | 1 | |a Li, Mu |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Mobile networks and applications |d Springer US, 1996 |g 26(2019), 2 vom: 02. Okt., Seite 808-829 |w (DE-627)215279522 |w (DE-600)1342049-5 |w (DE-576)063244756 |x 1383-469X |7 nnns |
773 | 1 | 8 | |g volume:26 |g year:2019 |g number:2 |g day:02 |g month:10 |g pages:808-829 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11036-019-01353-0 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 26 |j 2019 |e 2 |b 02 |c 10 |h 808-829 |
author_variant |
x q xq l y ly k g kg l m lm m s ms m k mk m l ml |
---|---|
matchkey_str |
article:1383469X:2019----::sreoteeeomnoslognznmpfrnuevs |
hierarchy_sort_str |
2019 |
publishDate |
2019 |
allfields |
10.1007/s11036-019-01353-0 doi (DE-627)OLC2125370654 (DE-He213)s11036-019-01353-0-p DE-627 ger DE-627 rakwb eng 004 VZ Qu, Xiaofei verfasserin aut A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. Self organizing map (SOM) Hierarchical self-organizing map (HSOM) Growing hierarchical self-organizing map (GHSOM) Intrusion detection system (IDS) Yang, Lin aut Guo, Kai aut Ma, Linru aut Sun, Meng aut Ke, Mingxing aut Li, Mu aut Enthalten in Mobile networks and applications Springer US, 1996 26(2019), 2 vom: 02. Okt., Seite 808-829 (DE-627)215279522 (DE-600)1342049-5 (DE-576)063244756 1383-469X nnns volume:26 year:2019 number:2 day:02 month:10 pages:808-829 https://doi.org/10.1007/s11036-019-01353-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 26 2019 2 02 10 808-829 |
spelling |
10.1007/s11036-019-01353-0 doi (DE-627)OLC2125370654 (DE-He213)s11036-019-01353-0-p DE-627 ger DE-627 rakwb eng 004 VZ Qu, Xiaofei verfasserin aut A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. Self organizing map (SOM) Hierarchical self-organizing map (HSOM) Growing hierarchical self-organizing map (GHSOM) Intrusion detection system (IDS) Yang, Lin aut Guo, Kai aut Ma, Linru aut Sun, Meng aut Ke, Mingxing aut Li, Mu aut Enthalten in Mobile networks and applications Springer US, 1996 26(2019), 2 vom: 02. Okt., Seite 808-829 (DE-627)215279522 (DE-600)1342049-5 (DE-576)063244756 1383-469X nnns volume:26 year:2019 number:2 day:02 month:10 pages:808-829 https://doi.org/10.1007/s11036-019-01353-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 26 2019 2 02 10 808-829 |
allfields_unstemmed |
10.1007/s11036-019-01353-0 doi (DE-627)OLC2125370654 (DE-He213)s11036-019-01353-0-p DE-627 ger DE-627 rakwb eng 004 VZ Qu, Xiaofei verfasserin aut A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. Self organizing map (SOM) Hierarchical self-organizing map (HSOM) Growing hierarchical self-organizing map (GHSOM) Intrusion detection system (IDS) Yang, Lin aut Guo, Kai aut Ma, Linru aut Sun, Meng aut Ke, Mingxing aut Li, Mu aut Enthalten in Mobile networks and applications Springer US, 1996 26(2019), 2 vom: 02. Okt., Seite 808-829 (DE-627)215279522 (DE-600)1342049-5 (DE-576)063244756 1383-469X nnns volume:26 year:2019 number:2 day:02 month:10 pages:808-829 https://doi.org/10.1007/s11036-019-01353-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 26 2019 2 02 10 808-829 |
allfieldsGer |
10.1007/s11036-019-01353-0 doi (DE-627)OLC2125370654 (DE-He213)s11036-019-01353-0-p DE-627 ger DE-627 rakwb eng 004 VZ Qu, Xiaofei verfasserin aut A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. Self organizing map (SOM) Hierarchical self-organizing map (HSOM) Growing hierarchical self-organizing map (GHSOM) Intrusion detection system (IDS) Yang, Lin aut Guo, Kai aut Ma, Linru aut Sun, Meng aut Ke, Mingxing aut Li, Mu aut Enthalten in Mobile networks and applications Springer US, 1996 26(2019), 2 vom: 02. Okt., Seite 808-829 (DE-627)215279522 (DE-600)1342049-5 (DE-576)063244756 1383-469X nnns volume:26 year:2019 number:2 day:02 month:10 pages:808-829 https://doi.org/10.1007/s11036-019-01353-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 26 2019 2 02 10 808-829 |
allfieldsSound |
10.1007/s11036-019-01353-0 doi (DE-627)OLC2125370654 (DE-He213)s11036-019-01353-0-p DE-627 ger DE-627 rakwb eng 004 VZ Qu, Xiaofei verfasserin aut A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. Self organizing map (SOM) Hierarchical self-organizing map (HSOM) Growing hierarchical self-organizing map (GHSOM) Intrusion detection system (IDS) Yang, Lin aut Guo, Kai aut Ma, Linru aut Sun, Meng aut Ke, Mingxing aut Li, Mu aut Enthalten in Mobile networks and applications Springer US, 1996 26(2019), 2 vom: 02. Okt., Seite 808-829 (DE-627)215279522 (DE-600)1342049-5 (DE-576)063244756 1383-469X nnns volume:26 year:2019 number:2 day:02 month:10 pages:808-829 https://doi.org/10.1007/s11036-019-01353-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 26 2019 2 02 10 808-829 |
language |
English |
source |
Enthalten in Mobile networks and applications 26(2019), 2 vom: 02. Okt., Seite 808-829 volume:26 year:2019 number:2 day:02 month:10 pages:808-829 |
sourceStr |
Enthalten in Mobile networks and applications 26(2019), 2 vom: 02. Okt., Seite 808-829 volume:26 year:2019 number:2 day:02 month:10 pages:808-829 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Self organizing map (SOM) Hierarchical self-organizing map (HSOM) Growing hierarchical self-organizing map (GHSOM) Intrusion detection system (IDS) |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Mobile networks and applications |
authorswithroles_txt_mv |
Qu, Xiaofei @@aut@@ Yang, Lin @@aut@@ Guo, Kai @@aut@@ Ma, Linru @@aut@@ Sun, Meng @@aut@@ Ke, Mingxing @@aut@@ Li, Mu @@aut@@ |
publishDateDaySort_date |
2019-10-02T00:00:00Z |
hierarchy_top_id |
215279522 |
dewey-sort |
14 |
id |
OLC2125370654 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">OLC2125370654</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230505102001.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">230505s2019 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11036-019-01353-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2125370654</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11036-019-01353-0-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Qu, Xiaofei</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC, part of Springer Nature 2019</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Self organizing map (SOM)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hierarchical self-organizing map (HSOM)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Growing hierarchical self-organizing map (GHSOM)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intrusion detection system (IDS)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Lin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guo, Kai</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ma, Linru</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Meng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ke, Mingxing</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Mu</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Mobile networks and applications</subfield><subfield code="d">Springer US, 1996</subfield><subfield code="g">26(2019), 2 vom: 02. Okt., Seite 808-829</subfield><subfield code="w">(DE-627)215279522</subfield><subfield code="w">(DE-600)1342049-5</subfield><subfield code="w">(DE-576)063244756</subfield><subfield code="x">1383-469X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:26</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:2</subfield><subfield code="g">day:02</subfield><subfield code="g">month:10</subfield><subfield code="g">pages:808-829</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11036-019-01353-0</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">26</subfield><subfield code="j">2019</subfield><subfield code="e">2</subfield><subfield code="b">02</subfield><subfield code="c">10</subfield><subfield code="h">808-829</subfield></datafield></record></collection>
|
author |
Qu, Xiaofei |
spellingShingle |
Qu, Xiaofei ddc 004 misc Self organizing map (SOM) misc Hierarchical self-organizing map (HSOM) misc Growing hierarchical self-organizing map (GHSOM) misc Intrusion detection system (IDS) A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection |
authorStr |
Qu, Xiaofei |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)215279522 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1383-469X |
topic_title |
004 VZ A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection Self organizing map (SOM) Hierarchical self-organizing map (HSOM) Growing hierarchical self-organizing map (GHSOM) Intrusion detection system (IDS) |
topic |
ddc 004 misc Self organizing map (SOM) misc Hierarchical self-organizing map (HSOM) misc Growing hierarchical self-organizing map (GHSOM) misc Intrusion detection system (IDS) |
topic_unstemmed |
ddc 004 misc Self organizing map (SOM) misc Hierarchical self-organizing map (HSOM) misc Growing hierarchical self-organizing map (GHSOM) misc Intrusion detection system (IDS) |
topic_browse |
ddc 004 misc Self organizing map (SOM) misc Hierarchical self-organizing map (HSOM) misc Growing hierarchical self-organizing map (GHSOM) misc Intrusion detection system (IDS) |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Mobile networks and applications |
hierarchy_parent_id |
215279522 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Mobile networks and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)215279522 (DE-600)1342049-5 (DE-576)063244756 |
title |
A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection |
ctrlnum |
(DE-627)OLC2125370654 (DE-He213)s11036-019-01353-0-p |
title_full |
A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection |
author_sort |
Qu, Xiaofei |
journal |
Mobile networks and applications |
journalStr |
Mobile networks and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
container_start_page |
808 |
author_browse |
Qu, Xiaofei Yang, Lin Guo, Kai Ma, Linru Sun, Meng Ke, Mingxing Li, Mu |
container_volume |
26 |
class |
004 VZ |
format_se |
Aufsätze |
author-letter |
Qu, Xiaofei |
doi_str_mv |
10.1007/s11036-019-01353-0 |
dewey-full |
004 |
title_sort |
a survey on the development of self-organizing maps for unsupervised intrusion detection |
title_auth |
A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection |
abstract |
Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. © Springer Science+Business Media, LLC, part of Springer Nature 2019 |
abstractGer |
Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. © Springer Science+Business Media, LLC, part of Springer Nature 2019 |
abstract_unstemmed |
Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions. © Springer Science+Business Media, LLC, part of Springer Nature 2019 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 |
container_issue |
2 |
title_short |
A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection |
url |
https://doi.org/10.1007/s11036-019-01353-0 |
remote_bool |
false |
author2 |
Yang, Lin Guo, Kai Ma, Linru Sun, Meng Ke, Mingxing Li, Mu |
author2Str |
Yang, Lin Guo, Kai Ma, Linru Sun, Meng Ke, Mingxing Li, Mu |
ppnlink |
215279522 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11036-019-01353-0 |
up_date |
2024-07-04T03:27:46.020Z |
_version_ |
1803617478667927552 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">OLC2125370654</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230505102001.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">230505s2019 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11036-019-01353-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2125370654</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11036-019-01353-0-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Qu, Xiaofei</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC, part of Springer Nature 2019</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract This paper describes a focused literature survey of self-organizing maps (SOM) in support of intrusion detection. Specifically, the SOM architecture can be divided into two categories, i.e., static-layered architectures and dynamic-layered architectures. The former one, Hierarchical Self-Organizing Maps (HSOM), can effectively reduce the computational overheads and efficiently represent the hierarchy of data. The latter one, Growing Hierarchical Self-Organizing Maps (GHSOM), is quite effective for online intrusion detection with low computing latency, dynamic self-adaptability, and self-learning. The ultimate goal of SOM architecture is to accurately represent the topological relationship of data to identify any anomalous attack. The overall goal of this survey is to comprehensively compare the primitive components and properties of SOM-based intrusion detection. By comparing with the two SOM-based intrusion detection systems, we can clearly understand the existing challenges of SOM-based intrusion detection systems and indicate the future research directions.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Self organizing map (SOM)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hierarchical self-organizing map (HSOM)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Growing hierarchical self-organizing map (GHSOM)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intrusion detection system (IDS)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Lin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guo, Kai</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ma, Linru</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Meng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ke, Mingxing</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Mu</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Mobile networks and applications</subfield><subfield code="d">Springer US, 1996</subfield><subfield code="g">26(2019), 2 vom: 02. Okt., Seite 808-829</subfield><subfield code="w">(DE-627)215279522</subfield><subfield code="w">(DE-600)1342049-5</subfield><subfield code="w">(DE-576)063244756</subfield><subfield code="x">1383-469X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:26</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:2</subfield><subfield code="g">day:02</subfield><subfield code="g">month:10</subfield><subfield code="g">pages:808-829</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11036-019-01353-0</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">26</subfield><subfield code="j">2019</subfield><subfield code="e">2</subfield><subfield code="b">02</subfield><subfield code="c">10</subfield><subfield code="h">808-829</subfield></datafield></record></collection>
|
score |
7.4006386 |