Skip to main content

An Electronic Reconfigurable Neural Architecture for Intrusion Detection

  • Conference paper
  • 2089 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3562))

Abstract

The explosive growth of the traffic in computer systems has made it clear that traditional control techniques are not adequate to provide the system users fast access to network resources and prevent unfair uses. In this paper, we present a reconfigurable digital hardware implementation of a specific neural model for intrusion detection. It uses a specific vector of characterization of the network packages (intrusion vector) which is starting from information obtained during the access intent. This vector will be treated by the system. Our approach is adaptative and to detecting these intrusions by using a complex artificial intelligence method known as multilayer perceptron. The implementation have been developed and tested into a reconfigurable hardware (FPGA) for embedded systems. Finally, the Intrusion detection system was tested in a real-world simulation to gauge its effectiveness and real-time response.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abrams, M.D., Jajodia, S., Podell, H.J.: Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  2. Pfleeger, C.P.: Security in computing. PHH (1997)

    Google Scholar 

  3. CERT. Distributed denial of service tools. CERT Incident Note IN-99-07 (December 1999), http://www.cert.org/incident_notes/IN-99-07.html

  4. CERT. Results of the distributed-systems intruder tools workshop (November 1999), http://www.cert.org/reports/dsit_workshop-final.html

  5. Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co. Fort Washington, PA (1980)

    Google Scholar 

  6. Kumar, S.: Classification and Detection of Computer Intrusion. PhD thesis, Purdue University (August 1995)

    Google Scholar 

  7. Denning, D.E.: An intrusion-detection model. In: Proceedings IEEE Symposium on Security and Privacy, Oakland, CA, May 1986, pp. 118–131 (1986)

    Google Scholar 

  8. Fox, K.L., Henning, R., Reed, J.: A Neural Network Approach Towards Intrusion Detection. In: Proceedings of the 13th National Computer Security Conference, Washington, DC, October 1990, pp. 125–134 (1990)

    Google Scholar 

  9. Paxson, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX (1998)

    Google Scholar 

  10. Cohen, F.: Protection and Security on the Information Superhighway. John Wiley & Sons, Chichester (1995)

    Google Scholar 

  11. Amoroso, E.: Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace

    Google Scholar 

  12. Back, and Response. Intrusion.Net Books (1999)

    Google Scholar 

  13. Denning, D.E.: An intrusion detection model. IEEE Trans. Software Eng. se-13(2), 222–223 (1987)

    Article  Google Scholar 

  14. Durst, R., et al.: Testing an evaluation computer intrusion detection systems. Comm ACM 42(7), 53–61 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Picó, F.I., Olivo, A.G., Crespi, F.G., Camara, A. (2005). An Electronic Reconfigurable Neural Architecture for Intrusion Detection. In: Mira, J., Álvarez, J.R. (eds) Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach. IWINAC 2005. Lecture Notes in Computer Science, vol 3562. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11499305_39

Download citation

  • DOI: https://doi.org/10.1007/11499305_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26319-7

  • Online ISBN: 978-3-540-31673-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics