Skip to main content

A Novel Intrusions Detection Method Based on HMM Embedded Neural Network

  • Conference paper
Advances in Natural Computation (ICNC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3610))

Included in the following conference series:

Abstract

Due to the excellent performance of the HMM (Hidden Markov Model) in pattern recognition, it has been widely used in voice recognition, text recognition. In recent years, the HMM has also been applied to the intrusion detection. The intrusion detection method based on the HMM is more efficient than other methods. The HMM based intrusion detection method is composed by two processes: one is the HMM process; the other is the hard decision process, which is based on the profile database. Because of the dynamical behavior of system calls, the hard decision process based on the profile database cannot be efficient to detect novel intrusions. On the other hand, the profile database will consume many computer resources. For these reasons, the combined detection method was provided in this paper. The neural network is a kind of artificial intelligence tools and is combined with the HMM to make soft decision. In the implementation, radial basis function model is used, because of its simplicity and its flexibility to adapt pattern changes. With the soft decision based on the neural network, the robustness and accurate rate of detection model network, the robustness and accurate rate of detection model are greatly improved. The efficiency of this method has been evaluated by the data set originated from Hunan Technology University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)

    Article  Google Scholar 

  2. Susan, C.L., David, V.H.: Training a neural –network based intrusion detector to recognize novel attacks. IEEE Transactions on systems, man and cybernetics-part a: System and Humans 31(4), 294–299 (2001)

    Article  Google Scholar 

  3. Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. IEEE IJCNN (May 2002)

    Google Scholar 

  4. Debar, H., Becke, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (1992)

    Google Scholar 

  5. Manganaris: A data mining analysis of RTID alarms. Computer Networks 34(4), 571–577 (2000)

    Google Scholar 

  6. Tran, Q., Zhang, Q.L., Li, X.: SVM classification-based intrusion detection system. Journal of China Institute of Communications 23(5) (May 2002)

    Google Scholar 

  7. Warrender, C., Forrest, S., Pealmutt, B.: Detecting intrusion using system calls: alternative data mode. In: IEEE Symposium on Security and Privacy, pp. 133–145 (1999)

    Google Scholar 

  8. Cho, S.B., Park, H.J.: Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computers and Security 22(1), 45–55 (2003)

    Article  MathSciNet  Google Scholar 

  9. Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. Electronics Letters, 38(13) (June 20, 2002)

    Google Scholar 

  10. Zhang, X.Q., Fan, P.Z., Zhu, Z.L.: A new anomaly detection method based on hierarchical HMM. In: PDCAT 2003, China, pp. 249–252 (2003)

    Google Scholar 

  11. Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the Research in Security and Privacy, 1992 IEEE Computer Society Symposium, pp. 240–250 (1992)

    Google Scholar 

  12. Dugad, R., Desai, U.B.: A tutorial on hidden Markov models, Technical Report No.: SPANN-96.1 (1996)

    Google Scholar 

  13. Fox, L.K., Henning, R.R., Jonathan, H.: A Neural network approach Towards Intrusion Detection. In: Proceeding of the 13th National Computer Security Conference (2000)

    Google Scholar 

  14. Gao, B., Ma, H.Y., Yang, Y.H.: HMMS based on anomaly intrusion detection method. In: Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing (November 2002)

    Google Scholar 

  15. Jiang, W.: Hybird Genetic algorithm research and its application in problem optimization. In: Proceedings of 2004 International Conference on Manchine Learning and Cybernetics, pp. 222–227 (2004)

    Google Scholar 

  16. Jiang, W.: Research on Optimize Prediction Model and Algorithm about Chaotic Time Series. Wuhan University Journal of Natural Sciences 9(5), 735–740 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, W., Xu, Y., Xu, Y. (2005). A Novel Intrusions Detection Method Based on HMM Embedded Neural Network. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539087_16

Download citation

  • DOI: https://doi.org/10.1007/11539087_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28323-2

  • Online ISBN: 978-3-540-31853-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics