Please use this identifier to cite or link to this item: https://research.matf.bg.ac.rs/handle/123456789/2579
DC FieldValueLanguage
dc.contributor.authorAbuadlla, Yousefen_US
dc.contributor.authorKvaščev, Goranen_US
dc.contributor.authorGajin, Slavkoen_US
dc.contributor.authorJovanović, Zoranen_US
dc.date.accessioned2025-09-17T15:27:12Z-
dc.date.available2025-09-17T15:27:12Z-
dc.date.issued2014-
dc.identifier.urihttps://research.matf.bg.ac.rs/handle/123456789/2579-
dc.description.abstractComputer systems and networks suffer due to rapid increase of attacks, and in order to keep them safe from malicious activities or policy violations, there is need for effective security monitoring systems, such as Intrusion Detection Systems (IDS). Many researchers concentrate their efforts on this area using different approaches to build reliable intrusion detection systems. Flow-based intrusion detection systems are one of these approaches that rely on aggregated flow statistics of network traffic. Their main advantages are host independence and usability on high speed networks, since the metrics may be collected by network device hardware or standalone probes. In this paper, an intrusion detection system using two neural network stages based on flow-data is proposed for detecting and classifying attacks in network traffic. The first stage detects significant changes in the traffic that could be a potential attack, while the second stage defines if there is a known attack and in that case classifies the type of attack. The first stage is crucial for selecting time windows where attacks, known or unknown, are more probable. Two different neural network structures have been used, multilayer and radial basis function networks, with the objective to compare performance, memory consumption and the time required for network training. The experimental results demonstrate that the designed models are promising in terms of accuracy and computational time, with low probability of false alarms.en_US
dc.language.isoenen_US
dc.publisherNovi Sad : ComSIS consortiumen_US
dc.relation.ispartofComputer Science and Information Systemsen_US
dc.subjectintrusion detection systemen_US
dc.subjectanomaly detection systemen_US
dc.subjectNeural networksen_US
dc.subjectnet flowen_US
dc.titleFlow-Based Anomaly Intrusion Detection System Using Two Neural Network Stagesen_US
dc.typeArticleen_US
dc.identifier.doi10.2298/csis130415035a-
dc.identifier.scopus2-s2.0-84904507014-
dc.identifier.isi000340077000010-
dc.identifier.urlhttp://dx.doi.org/10.2298/csis130415035a-
dc.relation.issn1820-0214en_US
dc.description.rankM22en_US
dc.relation.firstpage601en_US
dc.relation.lastpage622en_US
dc.relation.volume11en_US
dc.relation.issue2en_US
item.openairetypeArticle-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextnone-
crisitem.author.orcid0000-0002-8939-3589-
Appears in Collections:Research outputs
Show simple item record

SCOPUSTM   
Citations

41
checked on Nov 10, 2025

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.