CFP last date
20 May 2024
Reseach Article

Multiuser Authentication and Intruder Detection using Neural Computing

by Suma Santosh, Savita S. Biradar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 17
Year of Publication: 2013
Authors: Suma Santosh, Savita S. Biradar
10.5120/10724-5655

Suma Santosh, Savita S. Biradar . Multiuser Authentication and Intruder Detection using Neural Computing. International Journal of Computer Applications. 64, 17 ( February 2013), 8-11. DOI=10.5120/10724-5655

@article{ 10.5120/10724-5655,
author = { Suma Santosh, Savita S. Biradar },
title = { Multiuser Authentication and Intruder Detection using Neural Computing },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 17 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number17/10724-5655/ },
doi = { 10.5120/10724-5655 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:16:41.280517+05:30
%A Suma Santosh
%A Savita S. Biradar
%T Multiuser Authentication and Intruder Detection using Neural Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 17
%P 8-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The objective of the paper is to mainly detect the Intruder activity in security systems and to authorize the correct person to make use of resources which is done using Artificial Neural Networks. Security is a broad topic and covers many issues. Malicious people trying to gain some benefit, attention, or to harm someone intentionally cause most security problems. An Intrusion Detection System detects attacks as soon as possible and takes appropriate action. ANN provides Multilevel, Multivariable security system, which can fulfill the strong requirement of security. Apart from providing security, ANN will have the capability to detect, if any intrusion happens.

References
  1. Survey on Intrusion Detection Methods,Sanoop Mallissery, Jeevan Prabhu, Raghavendra Ganiga 3, Proc. of 1nt. Con/, on Advances in Recent Technologies in Communication and Computing 2011
  2. A Neural Network Based Anomaly Intrusion Detection System, Sufyan T. Faraj Al-Janabi and Hadeel Amjed Saeed, 2011 Developments in E-systems engineering.
  3. Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks Mohammad Reza Norouzian, Sobhan Merati ISBN 978-89-5519-155-4.
  4. Jacek M. Zurada, Introduction to Artificial Neural Systems, Sixth Jaico Impression, 2003.
  5. Artificial Neural Network Learning: A comparative Review, by Costas Neocleous, Christos schizas, Lecture Notes in Computer Science; Vol. 2308, 2002, Pages: 300 - 313.
  6. Aurobindo Sundaram, An Introduction to Intrusion Detection, 3rd edition 2000.
  7. Supervised Learning in Feed forward Artificial Neural Networks by Robert J. Marks, MIT Press, 1998.
  8. Lin. M. Miikkulainen, Intrusion Detection with Neural Networks 2nd edition 1995.
  9. S. Haykin, Neural Networks: A comprehensive Foundation, Macmillan College Press, New York, 1994.
  10. J. Hertz, A. Krogh, and R. G. Palmer, Introduction to the theory of Neural Computation, Addison-Wesley, 1991.
Index Terms

Computer Science
Information Sciences

Keywords

ANN multilayer feed forward network Error back propagation algorithm Intrusion detection