Skip to content


  • Research
  • Open Access

A new intrusion detection and alarm correlation technology based on neural network

EURASIP Journal on Wireless Communications and Networking20192019:109

  • Received: 28 December 2018
  • Accepted: 28 March 2019
  • Published:


With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the network. Intrusion detection of the traditional intrusion detection and alarm technology is not sufficient. Based on neural network technology, this paper studies the intrusion detection and alarm correlation technology. Based on the research on the working principle and workflow of the existing intrusion detection system, a new neural network-based intrusion detection and alarm method is proposed. A neural network-based intrusion detection and alarm system is designed and implemented. Through the experiment of the system prototype, the results show that the intrusion detection and alarm system based on the neural network has a higher detection rate and a lower false alarm rate for intrusion behaviors such as denial of service attack and has higher detection ability for unknown attack behaviors.


  • Network security
  • Neural network
  • Intrusion detection
  • Alarm

1 Introduction

With the rapid development of network technology and the advent of the network era, network security has been becoming more and more important [1]. Determining a complete network security policy is an important means to ensure network security [2, 3]. One of the most popular network security models is the PPDR model, which focuses on network security policies. It includes four parts: policy, protection, detection, and response [4].

Intrusion detection and alerting techniques are the primary means of implementing the “detection” part of the model [5]. Intrusion detection and alerting, as a proactive security protection technology, provides a real-time protection against internal attacks, external attacks, and misuse, intercepting and responding to intrusions before the network system is compromised [6]. However, with the diversification of intrusion technology, the traditional expert system-based intrusion detection and alarm technology gradually exposes its shortcomings such as the inability to detect unknown attacks or even variants of unknown attacks [7]. Therefore, the implementation methods for intrusion detection should be diversified, and it is a general trend to integrate intelligent technology into intrusion detection and alarm systems [8].

In this paper, we use the advantages of artificial neural network self-learning, self-adaptation, nonlinearity, and robustness to study a simple and effective intrusion detection and alarm system based on artificial neural network. This is also the purpose of studying the system, that is, designing and implementing intrusion detection and alarm model, which not only can detect known attacks, but has good detection capabilities for unknown attacks.

2 Related work

2.1 Intrusion detection technology

An intrusion is any act that attempts to compromise the integrity, confidentiality, or availability of computer resources. At present, network security is becoming increasingly prominent [9]. In the first half of 2018, the statistics of Tencent Security Anti-Virus Lab showed that the total number of viruses blocked by the PC side was one billion times [10]. The total number of viruses increased by 30% compared with the number of viruses intercepted by Tencent Security Anti-Virus Lab in the second half of 2017. The Trojan virus was intercepted nearly 170 million times. In April and June, the peak of the virus was intercepted, and the number of interception was 180 million times, as shown in Fig. 1.
Fig. 1
Fig. 1

Number of viruses intercepted by the PC

Intrusion detection is the detection of intrusion [11]. It collects information from several key points in a computer network or system and analyzes this information to discover whether there are violations of security policies and signs of attacks in the network or system [12]. The combination of software and hardware for intrusion detection is the intrusion detection system (IDS). The intrusion detection system is mainly composed of the following parts:
  1. 1.

    Data collection and audit data reflect the status of information and pass it to the detector.

  2. 2.

    The detector is responsible for analyzing and detecting the intrusion and issuing a warning message.

  3. 3.

    Knowledge base provides the necessary data information support.

  4. 4.

    The controller responds manually or automatically according to the alarm information.

In recent years, major progress has been made in directions for intrusion detection technology:
  1. 1.

    Distributed intrusion detection and general intrusion detection architecture.

  2. 2.

    Application layer intrusion detection

  3. 3.

    Intelligent intrusion detection.

  4. 4.

    Evaluation methods for intrusion detection.

  5. 5.

    The combination of network security technologies.


Classification is based on intrusion detection methods. Two basic analytical methods are commonly used to analyze events and detect intrusion behaviors, namely misuse detection and anomaly detection. Both analytical methods have their own advantages and disadvantages [13]. The most effective method should be the use of misuse detection by the subject technology and assist in the use of anomaly detection.

2.2 Artificial neural network technology

Artificial neural network technology is an intelligent information processing technology that simulates the processing, storage, and processing mechanism of the human brain [14]. The artificial neural network is a highly complex large-scale nonlinear adaptive network system composed of a large number of simple processing unit neurons. Through the corresponding learning algorithm, the relationship between the features and data contained in the data set is abstracted to the nerve. The form distribution of the state of the element and the strength of the connection between the neurons implements a mapping from input to output.

2.2.1 Basic principles of neurons

The structure of the neural network is determined by the basic processing unit and its interconnection method. The basic processing unit of the connection mechanism structure and neurophysiological analogy is often referred to as neurons [15, 16]. Each neuron model that constructs the network simulates a biological neuron, as shown in Fig. 2.
Fig. 2
Fig. 2

Neuronal model

The neuron unit consists of a plurality of inputs, i = 1, 2, … , n and an output y. The intermediate state is represented by the weight of the input signal and the output is:
$$ {y}_i(t)=f\left(\sum \limits_{j=1}^n{w}_{ij}{x}_j-\theta i\right) $$
In Eq. (2.1), θi neuron unit bias (threshold), wij connections weight coefficient (for the excited state, wij positive values, for the suppression state, wij negative values), n is the number of input signals, yi neuron output, t is the time, f() output transform function, sometimes called excitation or excitation function, often using 0 and 1 binary function or sigmoid function, these three functions are continuous and non-linear. A binary function can be represented by Eq. (2.2):
$$ f(x)=\left\{\begin{array}{l}1,x\ge {x}_0\\ {}0,x<{x}_0\end{array}\right. $$
A conventional sigmoid function can be represented by Eq. (2.3):
$$ f(x)=\frac{1}{1+{e}^{- ax}},0<f(x)<1 $$
The commonly used hyperbolic tangent function replaces the conventional sigmoid function because the output of the sigmoid function is positive, and the output value of the hyperbolic tangent function can be positive or negative. The hyperbolic tangent function is shown in Eq. (2.4):
$$ f(x)=\frac{1-{e}^{- ax}}{1+{e}^{- ax}},\hbox{-} 1<f(x)<1 $$

2.2.2 The basic structure of artificial neural networks

  1. 1.

    Recursive network: In a recursive network, multiple neurons are interconnected to organize an interconnected neural network. The output of some neurons is fed back to the same or anterior neurons. Therefore, the signal can flow from the forward and reverse directions. The Hopfield network, the Elman network, and the Jordan network are representative examples of recursive networks. A recursive network is also called a feedback network. In Fig. 3, the state of Vi node, the input (initial) value of Xi nodes, and the output value after convergence of X'i, i = 1, 2, … , n.

  2. 2.

    Feed forward network: The feed forward network has a hierarchical layered structure, which consists of some layers of interconnected neurons that do not have interconnections. The signal from the input layer to the output layer flows through a one-way connection; the neurons are connected from one layer to the next, but there is no connection between the neurons in the same layer.

Fig. 3
Fig. 3

The system flow based on neural network

In the figure, the solid line indicates the actual signal flow and the broken line indicates the back propagation. Examples of feed forward networks are multilayer perceptron (MLP), learning vector quantization (LVQ) networks, cerebellar model connection control (CMAC) networks, and data processing methods (GMDH) networks.

2.3 Typical model of artificial neural network

Among the dozens of neural network models, Hopfield network, back propagation (BP) network, adaptive resonance theory (ART) network, and LVQ network are used.

2.3.1 Hopfield Network

The Hopfield network is the most typical feedback network model, but it is one of the most studied models. The Hopfield network is a self-associative network of single layers composed of the same neurons without learning functions. The training of the Hopfield network is only one step. The weight of the network is directly specified as follows:
$$ {w}_{ij}=\left\{\begin{array}{l}\frac{1}{N}\sum {x}_i^c{x}_j^c,i\ne j\\ {}0,i=j\end{array}\right. $$
When an unknown mode is input to this network, set its output initial value that equal to the component of the unknown mode, namely:
$$ {y}_i(0)={x}_i,1\le i\le N $$
Starting from these initial values, the network iterates according to the following equation until a certain minimum energy voltaic state is reached, i.e., its output is stable at a constant value:
$$ {y}_i\left(k+1\right)=f\left[\sum \limits_{j=1}^N{w}_{ij}{y}_i(k)\right],1\le i\le N $$
Where f is a hard limit function defined as:
$$ f(x)=\left\{\begin{array}{l}-1,x<0\\ {}1,x>0\end{array}\right. $$

2.3.2 Back propagation network

The BP network is a multi-layer image network that is reversed and can correct errors. When the parameters are not appropriate, the network can converge to a small mean square error so it is one of the most widely used networks. It can be used for language synthesis, recognition, and adaptive control. The training of BP network is divided into two processes: forward propagation and reverse propagation.

Forward propagation process is like this. The weight wki and the neuron threshold θk of each layer of the initialization network are set to be small random numbers not equal to zero. Where wki represents the weight between the k-th neuron of the current layer and the i-th neuron of the next layer, and θk represents the closed value of the k-th neuron of the current layer, according to the provided samples, the calculation of each layer of the neural network and the output of the neurons is as follows:
$$ {y}_k=\varphi \left(\sum \limits_{j=1}^p{w}_{kj}-{\theta}_k\right) $$
Where x1,x2, … , xp all are inputs to the neuron, and φ() is the Sigmoid function. There are two types of φ():
$$ \varphi (v)=\frac{1}{1+{e}^{- ov}} $$
$$ \varphi (v)=\frac{1-{e}^{-v}}{1+{e}^{-v}} $$
This paper adopts the first form and takes the coefficient σ = 1 and calculates the errors of the current learning samples:
$$ E=\sum \limits_{i=1}^m{\left({d}_i-{y}_i\right)}^2 $$
where di is the standard output of the sample and m is the number of output neurons.
Back propagation process is like this. The weight and threshold are adjusted according to the output error term of each layer of neurons. The j-th neuron of the output layer uses the formula as follows, where d1 is the standard output of the sample:
$$ {\delta}_j={y}_j\left(1-{y}_j\right)\left({d}_i-{y}_j\right) $$
The k-th neuron of the hidden layer uses the formula:
$$ {\delta}_k={o}_k\left(1-{o}_k\right)\sum \limits_{j=1}^m{\delta}_j{w}_{kj} $$
Where ok the actual output of the neuron is, δj is the output error of the j-th neuron in the output layer, and wkj is the weight between the k-th neuron of the hidden layer and the j-th neuron of the output layer; the adjustment formula is:
$$ {w}_{kj}={w}_{kj}+{\eta \delta}_j{O}_k $$
where η is the learning speed; the threshold adjustment formula is:
$$ {\theta}_j={\theta}_j+{\eta \delta}_j $$
Determine whether the learning sample has been learned. If it has not been completed, enter the forward propagation phase. If the sample has been learned, calculate the cumulative errors of all samples, if E < ε is satisfied. Then, the training process is over and enters the test phase; otherwise, the sample is re-learned and transferred to the forward propagation phase. The formula for calculating the cumulative error is:
$$ E=\frac{\sqrt{\sum \limits_{i=1}^P{E}_i}}{m\times p} $$
where p is the number of sample learning, and m is the number of neurons in the output layer.

2.3.3 Adaptive resonance theory (ART)

The ART network is also a self-organizing network model. The adaptive resonance theory (ART) network has different versions including ART-1 version for handling binary input. New versions, such as ART-2, are capable of handling continuous value inputs.

The alert vector vi constitutes a short-term memory of the network. vi and wi are related, wi is a normalized copy of vi, i.e.,:
$$ {w}_i=\frac{v_i}{\varepsilon +\sum {v}_{ji}} $$

2.3.4 Learning vector quantization network

A learning vector quantization (LVQ) network consists of three layers of neurons, the input conversion layer, the hidden layer, and the output layer.

3 Methods

For the application of artificial neural networks in intrusion detection and alarm, the predecessors have done some research work. The main function of the intrusion detection and alarm system is to detect the intrusion behavior in the computer network or computer system. The main actions include data collection, data clustering, behavior judgment and classification, alarm time, and response to intrusion time. But in the final analysis, there are only two cores of intrusion detection systems:
  1. 1.

    Based on the existing attack knowledge, it is speculated whether the current context-related time is a suspicious attack behavior.

  2. 2.

    Based on the existing knowledge of normal system activities, it is speculated whether the current context with context is within the scope of normal system activity.


The above knowledge is the basis on which the intrusion detection system relies. In practical applications, it exists in the form of system logs and intrusion attack means.

3.1 System design

The intrusion detection alarm model based on the artificial neural network mainly includes the following modules: network packet interception module, protocol parsing module, message parsing module, artificial neural network detection, and response module, as shown in Fig. 3:

The network packet interception module is responsible for intercepting data packets from the network, including data frames, IP packets, and packets transmitted on the network. This part of the work can be done by some software, such as Lipcap and Wincap. The protocol parsing module mainly performs protocol parsing and rule matching. The preprocessing module is responsible for the numerical conversion function and converting network packets of different protocol layers into corresponding mathematical vectors as input signals of the neural network engine. The network data packets are classified, and each type of data packet is detected by using a suitable neural network engine to determine whether it is an attack behavior, such as Web submodule and Telnet submodule.

3.2 Selection of neural network types

This design uses BP network, and the full name of BP network is Back Propagation Network, BP network training algorithm originally developed by Werbos, which is an iterative gradient algorithm for solving the minimum mean square errors between the actual output and the expected output of the feedforward network. The BP network is a multi-layer mapping network that transmits backwards and corrects errors. When the parameters are not appropriate, the network can converge to a small mean square error, so it is one of the most widely used networks.The learning algorithm process of BP network:
  1. 1.

    Forward transmission of information

Assuming the BP network has a total of L layers, for a given p samples, the expected output of the network is:
$$ {T}_d=\left[{T}_{d1},{T}_{d2},\dots {T}_{dp}\right] $$
When the p-th sample is input, the operational characteristics of the j-th neuron in the l(l = 1, 2,  … , L − 1) layer in the network are:
$$ {net}_{jp}^l=\sum \limits_{i=1}^{n_{l-1}}{W}_{ji}^{(l)}{O}_{ip}^{\left(l-1\right)}-{\theta}_j^l $$
$$ {O}_{jp}^{(l)}={f}_l\Big({net}_{jp}^{(l)} $$
Where wji is the connection weight of neuron i to neuron j; nL − 1 is the number of nodes of the L − 1 th layer; \( {O}_{jp}^{\left(l-1\right)} \) is the current input of neuron j; \( {O}_{jp}^{(l)} \) is the output of neuron j; fl is a nonlinear different non-decreasing function, generally taken as an S-type function, namely:
$$ {f}_l(x)=\frac{1}{1+{\mathrm{e}}^{-x}} $$
And for the output layer, there is
$$ {O}_{jp}^{(l)}={f}_L\left({net}_{jp}^{(l)}\right)=\sum \limits_{i=1}^{n_{l-1}}{W}_{ji}^{(l)}{O}_{ip}^{\left(L-1\right)}-{\theta}_j^L $$
The purpose of neural network learning is to achieve in each sample
$$ {E}_p=\frac{1}{2}\sum \limits_{i=1}^m{\left({T}_{jdp}-\overset{\wedge }{T}\right)}^2,\left(p=1,2,\dots, p\right) $$
(where m is the number of output nodes) to the minimum, thus ensure the total network error
$$ E=\sum \limits_{p=1}^p{E}_p $$
It is minimized, where \( {T}_{jdp},{\overset{\wedge }{T}}_{jp} \) is the expected output and actual output of the jth node of the output layer.
  1. 2.

    Using the gradient descent method to determine the changes of weights and the back propagation of errors

The gradient algorithm is used to correct the network weight and threshold. The weight coefficient iteration equation for the first layer is:
$$ W\left(k+1\right)=W(k)+\varDelta W\left(\mathrm{k}+1\right) $$
$$ W=\left\{{w}_{ij}\right\} $$
where k is the number of iteration
$$ \mathrm{Make}\kern0.24em {\varDelta}_p{w}_{ji}\infty =\frac{\partial {E}_p}{\partial {w}_{ij}^{(l)}}=-\frac{\partial {E}_p}{\partial {net}_{jp}^{(l)}}\frac{\partial {net}_{jp}^{(l)}}{\partial {w}_{ij}^{(l)}}=-\frac{\partial {E}_p}{\partial {net}_{jp}^{(l)}}{O}_{ip}^{\left(l-1\right)} $$
$$ \mathrm{Make}\kern0.24em {\delta}_{pj}^{(l)}=-\frac{\partial {E}_p}{\partial {net}_{jp}^{(l)}},\mathrm{then}\kern0.17em \mathrm{there}\kern0.17em \mathrm{is} $$
$$ {\varDelta}_p{w}_{ji}={\eta \delta}_{pj}^{(l)}{O}_{ip}^{\left(l-1\right)},\mathrm{where}\;\eta\;\mathrm{is}\kern0.17em \mathrm{learning}\kern0.17em \mathrm{step}. $$

3.3 BP network design

The intrusion detection model is modeled by using a multi-layer forward network. The structure of the multi-layer forward network is shown in Figs. 4 and 5.
Fig. 4
Fig. 4

Forward network structure

Fig. 5
Fig. 5

BP neural network false positive rate

According to the data processing module, the nine vectors are shown in Table 1:
Table 1

Input vector


Protocol type

Serve type

Link status

SR byte

RS byte


Wrong frame


Therefore, the number of neurons in the input layer of the network is 9. And because there are only two output results, attacked and normal, the number of neurons in the output layer is only one. Here, the output is set 1 when attacked, and the output is 0 when the system is normal. Since the actual output of the neural network is generally not an integer of 0 or 1, it is assumed that the system is attacked (or normal) when the output value approaches 1 (or 0) within a certain accuracy range.

Commonly used BP improvement algorithms mainly include additional momentum method, adaptive learning rate method and momentum-adaptive learning rate adjustment algorithm.
  1. 1.

    Additional momentum method

The additional momentum method allows the network to consider not only the effect of the error on the gradient, but the influence of the trend on the error surface when correcting its weight. The weight and threshold adjustment formula with additional momentum factor is:
$$ {w}_{ij}\left(k+1\right)=\left(1- mc\right){\eta \delta}_i{p}_j+ mc\varDelta {w}_{ij}(k) $$
$$ \varDelta {b}_i\left(k+1\right)=\left(1- mc\right){\eta \delta}_i+ mc\varDelta {b}_i(k) $$
The conditions for using the momentum method in the design of training programs are:
$$ mc=\left\{\begin{array}{l}0\kern2em E(k)>E\left(k-1\right)\ast 1.04\\ {}0.95\kern0.75em E(k)<E\left(k-1\right)\\ {} mc\kern1.25em \mathrm{other}s\end{array}\right. $$
Ekis the square of the error of the k-th step.
  1. 2.

    Adaptive learning rate

For a particular problem, choosing the right learning rate is not an easy task. It is usually obtained from experience or experiments, but even then, the learning rate that works well at the beginning of the training is not necessarily suitable for later training. The following formula gives an adjustment formula for the adaptive learning rate:
$$ \eta \left(k+1\right)=\left\{\begin{array}{l}1.05\eta (k)\kern0.75em E\left(k+1\right)<E(k)\\ {}0.7\eta (k)\kern0.5em E\left(k+1\right)>1.04E(k)\\ {}\eta (k)\kern2.25em \mathrm{others}\kern1.5em \end{array}\right. $$
Ek is the range of the k-th error squared and the initial learning rate η(0) can be very random.
  1. 3.

    Momentum-adaptive learning rate adjustment algorithm


When the aforementioned momentum method is used, the BP algorithm can find the global optimal solution, and when the adaptive learning rate is adopted, the BP algorithm can shorten the training time, and the two methods can also be used to train the neural network.

4 Experience

The two main metrics for evaluating the performance of intrusion detection and alerting systems are detection rates and false positive rates. The intrusion detection system should have a high detection rate and a low false positive rate at the same time. Simply pursuing a single indicator cannot effectively improve the performance of the intrusion detection system.

Select test data as shown below in Table 2.
Table 2

Detect sample type distribution

Sample type




Process Table


Number of samples






Sample type






Number of samples






Sample type






Number of samples






Sample type






Number of samples






The normal samples were randomly selected from 54,669 records. The attack data was selected from one attack of various attack types, and the total number of attack samples was 8341.

The pair of training times and final errors is shown in Table 3. The detection rate of various attack samples is shown in Table 4.
Table 3

BP neural network training results

Number of neurons






Number of training






Final error






Table 4

Attack sample detection comparison

Type of data

Number of Neurs

15 (%)

17 (%)

20 (%)

22 (%)

25 (%)







Process table
































































































The false positive rate of the normal data samples is shown in Fig. 5

Network convergence rate was tested. The BP neural network gradient descent algorithm is used, and the convergence curve is shown in Fig. 6.
Fig. 6
Fig. 6

Gradient descent algorithm convergence graph

It can be seen from Fig. 6 that when the network is trained by the default gradient descent algorithm, the number of iterations exceeds 1000 times before the network converges. And the closer the optimal value, the faster the network convergence speed. Using the improved BP algorithm, the convergence curve is shown in Fig. 7.
Fig. 7
Fig. 7

Improved BP algorithm convergence graph

As can be seen from Fig 7, when the training network is close to optimal, the network converges rapidly and greatly reducing the number of iterations.

The experimental results show that the neural network-based intrusion detection and alarm system has a high detection rate for denial of service attacks with a high time continuity. However, for a transient attack against a protocol or system vulnerability, or for an attack in which the characteristics of the intrusion are presented in the data segment of the packet, the network traffic characteristics and the network connection state are similar to the normal network behavior, but the extracted features cannot reflect it. The characteristics of this attack are therefore cannot be detected. This type of attack exploits feature-based detection and will have good results. For the attacks that do not appear in the training set, there is a high detection rate, which indicates that the artificial neural network-based intrusion detection can detect the unknown attack and the variant of the known attack well. In this respect, its advantages are obvious.

5 Results and discussion

This paper starts from the current network security situation, analyzes the importance and development status of intrusion detection, and solves the problems faced by traditional intrusion detection systems in detecting denial of service attacks. Based on the artificial neural network, this paper studies and implements a new intrusion detection of the alarm system. In this intrusion detection system, detection features including attributes related to time, connection characteristics and service types. These features show the difference between attack packets and normal packets, whether it is effective for known attacks or unknown attacks, which greatly improves the detection rate of denial of service attacks. The neural network-based intrusion detection and alarm system is proved to have obvious advantages compared with the traditional intrusion detection system. The system implemented in this paper, which is an attempt and preliminary exploration in the development direction of network intrusion detection. It is hoped that the new anomaly detection model can be applied to the actual security defense system, and the existing network security model is enriched and improved. The intelligent intrusion detection system provides a theoretical and experimental basis.



Public protection and disaster relief


Learning vector quantization


About the authors

Yansong Liu, Master of Electronic and communications engineering, Associate Professor. Graduated from the Shandong University in 2009. Worked in Shandong Management University. He research interests include Network behavior analysis, intelligent information processing.

Li Zhu, Doctor of Computer science, Associate Professor. Graduated from the Xi’an Jiao Tong University in 2000. Worked in Xi’an Jiaotong University. He research interests include machine learning, novel computer networking and digital media understanding.


(1) national natural science foundation youth project, fund no. : 61602370. Research on the measurement and modeling method of information communication laws across social media for network hot events

(2) project of national natural science foundation of China, fund no. : 61773310, research on implicit identity authentication method of mobile intelligent terminal for tactile behavior recognition

Availability of data and materials

The datasets used and/or analysed during the current study are available from the corresponding author on reasonable request.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Authors’ Affiliations

Xi’an Jiao Tong University, Xi’an, 710049, Shaanxi, China
Shandong Management University, Jinan, 250357, Shandong, China


  1. F. Hachmi, M. Limam, A. Improved, Intrusion detection system based on a two stage alarm correlation to identify outliers and false alerts. Lect. Notes Comput. Sci 9468, 130–139 (2015)View ArticleGoogle Scholar
  2. N. Hubballi, V. Suryanarayanan, Review: False alarm minimization techniques in signature-based intrusion detection systems: A survey. Comput. Commun. 49(8), 1–17 (2014)View ArticleGoogle Scholar
  3. G.H. Kim, H.W. Lee, in International Conference on Computational Science and ITS Applications. SVM based false alarm minimization scheme on intrusion prevention system (2006)Google Scholar
  4. H.J. Liao et al., Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)View ArticleGoogle Scholar
  5. O. Mazhelis, S. Puuronen, A framework for behavior-based detection of user substitution in a mobile context. Comput. Secur. 26(2), 154–176 (2007)View ArticleGoogle Scholar
  6. A. Mohamed, M. Ahmed, S. Chau, in IEEE International Symposium on Applied Machine Intelligence and Informatics. A new adaptive evidential reasoning approach for network alarm correlation (2012)Google Scholar
  7. A.A. Ramaki, M. Amini, R.E. Atani, RTECA: real time episode correlation algorithm for multi-step attack scenarios detection. Comput. Secur. 49, 206–219 (2015)View ArticleGoogle Scholar
  8. G.A. Barreto et al., Condition monitoring of 3G cellular networks through competitive neural models. IEEE Trans. Neural Netw. 16(5), 1064–1075 (2005)View ArticleGoogle Scholar
  9. A.S. Saratikov et al., Interactive wormhole detection and evaluation. Inf. Vis. 6(1), 3–17 (2007)View ArticleGoogle Scholar
  10. G.C. Tjhai et al., A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Comput. Secur. 29(6), 712–723 (2010)View ArticleGoogle Scholar
  11. S. Kabiraj, V. Topkar, R.C Walke, Going green: a holistic approach to transform business. Int. J. Manag. Inform. Technol. 2(3), 22–31 (2010)Google Scholar
  12. B. Zhang, X. Wang, Z. Zheng, The optimization for recurring queries in big data analysis system with MapReduce. Futur. Gener. Comput. Syst. (2017).
  13. S. Yao, A.K. Sangaiah, Z. Zheng, T. Wang, Sparsity estimation matching pursuit algorithm based on restricted isometry property for signal reconstruction. Futur. Gener. Comput. Syst..
  14. W. Hua, D. Mu, Z. Zheng, D. Guo, Online multi-person tracking assist by high-performance detection. J. Supercomput., 1–19.
  15. Y. Lin, X. Zhu, Z. Zheng, Z. Dou, R. Zhou, The individual Identication method of wireless device based on dimensionality reduction and machine learning. J. Supercomput., 1–18.
  16. Zhigao Zheng, Zunxin Zheng. Towards an improved heuristic genetic algorithm for static content delivery in cloud storage. Comput. Electr. Eng. (2017). 2017–6–28.


© The Author(s). 2019