A Study on Network Security Architecture and Analysis Using Artificial Neural Network Techniques
Addressing Network Security Challenges Using Artificial Neural Networks
Keywords:
network security architecture, analysis, artificial neural network techniques, intrusion events, ANN training algorithm, supervised algorithms, unsupervised algorithms, recurrent algorithms, intrusion detection, computer security policies, host computer, network, assault receiver, vulnerability overview, IoTAbstract
The purpose of this research work is to collect and track intrusion events more specifically using the applications of the ANN. The ANN training algorithm utilized to train neural weights is categorized between supervised, unsupervised and recurrent algorithms. Intrusion detection is the practice of observing and monitoring system or network activities for indicators of potential incidents involving the violation of computer security policies. Intrusion Detection could be utilized to protect a host computer or network, and also to be a victim or an assault receiver. The primary goal of this research work will be present a new mixture of an ANN algorithm that would be effective in detecting intrusion in a networked computer setting. This paper provides a vulnerability overview of the IoT and utilizes the ANN to tackle these challenges.Published
2018-01-01
How to Cite
[1]
“A Study on Network Security Architecture and Analysis Using Artificial Neural Network Techniques: Addressing Network Security Challenges Using Artificial Neural Networks”, JASRAE, vol. 14, no. 2, pp. 1549–1555, Jan. 2018, Accessed: Mar. 16, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/7423
Issue
Section
Articles
How to Cite
[1]
“A Study on Network Security Architecture and Analysis Using Artificial Neural Network Techniques: Addressing Network Security Challenges Using Artificial Neural Networks”, JASRAE, vol. 14, no. 2, pp. 1549–1555, Jan. 2018, Accessed: Mar. 16, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/7423