INTRUSION RECOGNITION USING NEURAL NETWORKS
DOI:
https://doi.org/10.47839/ijc.4.3.360Keywords:
Neural networks, intrusion detection systems, network attacks, attack recognitionAbstract
Intrusion detection techniques are of great importance for computer network protecting because of increasing the number of remote attack using TCP/IP protocols. There exist a number of intrusion detection systems, which are based on different approaches for anomalous behavior detection. This paper focuses on applying neural networks for attack recognition. It is based on multilayer perceptron. The 1999 KDD Cup data set is used for training and testing neural networks. The results of experiments are discussed in the paper.References
. M. Bishop, S. Cheung, C. Wee, J. Frank, J. Hoagland and S. Samorodin. The treat from the Net, IEEE Spectrum, 34(8), pp. 56-53, 1993.
. D. Anderson, T. Frivold & A. Valdes. Next-generation Intrusion Detection Expert Systems (NIDES): A Summary, SRI International Technical Report SRI-CSL-95-07, 1995.
. E. Spafford and D. Zamboni. Data collection mechanisms for intrusion detection systems, CERIAS Technical Report 2000-08, CERIAS, Pardue University, 1315 Recitation Building, West Lafayette, IN, 2000.
. H. Debar, M. Becke & D.Simboni. A Neural Network Component for an Intrusion Detection System, In proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, (1992).
. C. Jirapummin and N. Wattanapongsakorn. Visual Intrusion Detection using Self-Organizing Maps, Proc. of Electrical and Electronic Conference (EECON-24), Thailand, Vol. 2, pp. 1343-1349, 2001.
. S.C. Lee and D.V. Heinbuch. Training a Neural Network Based Intrusion Detector to Recognize Novel Attacks, Information Assistance and Security, pp. 40-46, 2000.
. S. C. Lee, D. V. Heinbuch, Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks, IEEE Trans. on Systems, Man, and Cybernetics, Part A, 31, 2001, pp. 294-299.
. A. K. Ghosh and A. Schwartzbard, A Study in Using Neural Networks for Anomaly and Misuse Detection, In Proc. of the USENIX Security Symposium, August 23-26, 1999, Washington, USA.
. J. Cannady, An adaptive neural network approach to intrusion detection and response, PhD Thesis, School of Comp. and Inf. Sci., Nova Southeastern University,
. J. M. Bonifacio et al., Neural Networks applied in intrusion detection systems, Proc. of the IEEE World congress on Comp. Intell. (WCCI’98), 1998.
. K. Hornik, M. Stinchcombe, H. White, Multy-layer feedforward networks are universal approximators, Neural Networks, 2 pp. 359-366, 1989.
. A. Lukatsky. Intrusion detection. Saint-Petersburg: BHV-Peterburg, 2003.
. MIT Lincoln Laboratory -DARPA Intrusion Detection Evaluation Web Page Template. Training Data Attack Descriptions http://www.ll.mit.edu/IST/ideval/docs/1998/attacks.html
. 1999 KDD Cup Competition. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
. W. Lee and S. J. Stolfo. A framework for constructing features and models for intrusion detection systems, ACM Trans. on Inform. and System Security, 3(4), 200, 227-261.
. J. Cannady, Applying Neural Networks to Misuse Detection, In Proceedings of the 21st National Information Systems Security Conference.
. WinPcap: the Free Packet Capture Architecture for Windows, NetGroup, Politecnico di Torino (Italy), http://winpcap.polito.it, 1999-2004.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.