Abstract
Due to the excellent performance of the HMM (Hidden Markov Model) in pattern recognition, it has been widely used in voice recognition, text recognition. In recent years, the HMM has also been applied to the intrusion detection. The intrusion detection method based on the HMM is more efficient than other methods. The HMM based intrusion detection method is composed by two processes: one is the HMM process; the other is the hard decision process, which is based on the profile database. Because of the dynamical behavior of system calls, the hard decision process based on the profile database cannot be efficient to detect novel intrusions. On the other hand, the profile database will consume many computer resources. For these reasons, the combined detection method was provided in this paper. The neural network is a kind of artificial intelligence tools and is combined with the HMM to make soft decision. In the implementation, radial basis function model is used, because of its simplicity and its flexibility to adapt pattern changes. With the soft decision based on the neural network, the robustness and accurate rate of detection model network, the robustness and accurate rate of detection model are greatly improved. The efficiency of this method has been evaluated by the data set originated from Hunan Technology University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)
Susan, C.L., David, V.H.: Training a neural –network based intrusion detector to recognize novel attacks. IEEE Transactions on systems, man and cybernetics-part a: System and Humans 31(4), 294–299 (2001)
Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. IEEE IJCNN (May 2002)
Debar, H., Becke, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (1992)
Manganaris: A data mining analysis of RTID alarms. Computer Networks 34(4), 571–577 (2000)
Tran, Q., Zhang, Q.L., Li, X.: SVM classification-based intrusion detection system. Journal of China Institute of Communications 23(5) (May 2002)
Warrender, C., Forrest, S., Pealmutt, B.: Detecting intrusion using system calls: alternative data mode. In: IEEE Symposium on Security and Privacy, pp. 133–145 (1999)
Cho, S.B., Park, H.J.: Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computers and Security 22(1), 45–55 (2003)
Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. Electronics Letters, 38(13) (June 20, 2002)
Zhang, X.Q., Fan, P.Z., Zhu, Z.L.: A new anomaly detection method based on hierarchical HMM. In: PDCAT 2003, China, pp. 249–252 (2003)
Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the Research in Security and Privacy, 1992 IEEE Computer Society Symposium, pp. 240–250 (1992)
Dugad, R., Desai, U.B.: A tutorial on hidden Markov models, Technical Report No.: SPANN-96.1 (1996)
Fox, L.K., Henning, R.R., Jonathan, H.: A Neural network approach Towards Intrusion Detection. In: Proceeding of the 13th National Computer Security Conference (2000)
Gao, B., Ma, H.Y., Yang, Y.H.: HMMS based on anomaly intrusion detection method. In: Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing (November 2002)
Jiang, W.: Hybird Genetic algorithm research and its application in problem optimization. In: Proceedings of 2004 International Conference on Manchine Learning and Cybernetics, pp. 222–227 (2004)
Jiang, W.: Research on Optimize Prediction Model and Algorithm about Chaotic Time Series. Wuhan University Journal of Natural Sciences 9(5), 735–740 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiang, W., Xu, Y., Xu, Y. (2005). A Novel Intrusions Detection Method Based on HMM Embedded Neural Network. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539087_16
Download citation
DOI: https://doi.org/10.1007/11539087_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28323-2
Online ISBN: 978-3-540-31853-8
eBook Packages: Computer ScienceComputer Science (R0)