A Backpropagation Neural Network for Computer Network Security
Reads0
Chats0
TLDR
This paper along with test results show that the possibility of guessing keys is extremely weaker than using the Data Encryption Standard method (DES), which is a widely-used method of data encryption.Abstract:
In this paper, an efficient and scalable technique for computer network security is presented. On one hand, the decryption scheme and the public key creation used in this work are based on a multi-layer neural network that is trained by backpropagation learning algorithm. On the other hand, the encryption scheme and the private key creation process are based on Boolean algebra. This is a new potential source for public key cryptographic schemes which are not based on number theoretic functions and have small time and memory complexities. This paper along with test results show that the possibility of guessing keys is extremely weaker than using the Data Encryption Standard method (DES), which is a widely-used method of data encryption. The presented results are obtained through the use of MATLAB 6.5.1 software.read more
Citations
More filters
Journal ArticleDOI
QSPR Flash Point Prediction of Solvents Using Topological Indices for Application in Computer Aided Molecular Design
TL;DR: Quantitative structure property relationship (QSPR) and topological indices have been used in this paper to predict flash point properties of different classes of solvents.
Journal ArticleDOI
Survey of data aggregation techniques using soft computing in wireless sensor networks
TL;DR: This study presents an up to date survey of major contributions to the security solutions in data aggregation which mainly use soft computing techniques, including fuzzy logic, swarm intelligence, genetic algorithm and neural networks.
Journal ArticleDOI
Retrieval of spinach crop parameters by microwave remote sensing with back propagation artificial neural networks: A comparison of different transfer functions
Rajendra Prasad,Abhishek Pandey,Kaleshwar Prasad Singh,Vijay P. Singh,Ram Kumar Mishra,D. Singh +5 more
TL;DR: The present analysis suggests the need of critical analysis of the BPANN in terms of selection of the best transfer function and other network parameters for the better results.
Journal ArticleDOI
Comparative analyses on medium optimization using one-factor-at-a-time, response surface methodology, and artificial neural network for lysine–methionine biosynthesis by Pediococcus pentosaceus RF-1
Norfarina Muhamad Nor,Mohd Shamzi Mohamed,Teck Chwen Loh,Hooi Ling Foo,Raha Abdul Rahim,Joo Shun Tan,Rosfarizan Mohamad +6 more
TL;DR: In this paper, an optimization strategy that encompassed one factor at a time (OFAT), response surface methodology (RSM), and artificial neural network method was implemented during medium formulation with specific
Automated Epileptic Seizure Detection in EEG Signals Using FastICA and Neural Network
TL;DR: A novel and efficient approach for automatically detecting the presence of epileptic seizures in EEG signals by using Fast Independent Component Analysis (FastICA), a Statistical Signal Processing Technique, and the BackPropagation Neural Network is proposed.
References
More filters
Book
Artificial Intelligence: A Modern Approach
Stuart Russell,Peter Norvig +1 more
TL;DR: In this article, the authors present a comprehensive introduction to the theory and practice of artificial intelligence for modern applications, including game playing, planning and acting, and reinforcement learning with neural networks.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book
Self-Organizing Maps
TL;DR: The Self-Organising Map (SOM) algorithm was introduced by the author in 1981 as mentioned in this paper, and many applications form one of the major approaches to the contemporary artificial neural networks field, and new technologies have already been based on it.
Book ChapterDOI
Anomalous Payload-Based Network Intrusion Detection
Ke Wang,Salvatore J. Stolfo +1 more
TL;DR: A payload-based anomaly detector, called PAYL, for intrusion detection that demonstrates the surprising effectiveness of the method on the 1999 DARPA IDS dataset and a live dataset the authors collected on the Columbia CS department network.
Intrusion detection with unlabeled data using clustering
TL;DR: “¦e4&2¦2nn¤2 U ¥ Se¦§¯4e ̈©SS ‘¬’¦ e-S«S«
Related Papers (5)
A symmetric key cryptography using genetic algorithm and error back propagation neural network
Vikas Sagar,Krishan Kumar +1 more
Efficient Integer Vector Homomorphic Encryption Using Deep Learning for Neural Networks
Tianying Xie,Yantao Li +1 more