Abstract
The increment of intrusions and bad uses in computer systems and internal networks of a great number of companies has caused an increase in concern for computer security. For some time one comes applying measures based on fire walls and in systems of intrusion detection (IDS). In this document we present an alternative to the problem of the IDS based on rules, using two different neural networks, a Multi-Layer perceptron, and a self organizative map. A series of experiments are carried out and the results are shown to be better than others found in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abrams, M.D., Jadodia, S., Podell, H.J. (eds.): Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos (1995)
Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 3rd edn. Prentice Hall Inc., New Jersey (2003)
CERT: Incident Note IN-99-07: Distributed Denial of Service Tools. CERT Software Engineering Institute. Carnegie Mellon University, Pittsburgh (2001)
Kumar, S.: Classification and Detection of Computer Intrusion. PhD thesis, Purdue University (August 1995)
Denning, D.E.: An Intrusion-Detection Model. IEEE Trans. Software Engineering SE 13(2), 222–232 (1987)
Kohonen, T.: Self-Organization and Associative Memory. Springer, New York (1987)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grediaga, Á., Ibarra, F., García, F., Ledesma, B., Brotóns, F. (2006). Application of Neural Networks in Network Control and Information Security. In: Wang, J., Yi, Z., Zurada, J.M., Lu, BL., Yin, H. (eds) Advances in Neural Networks - ISNN 2006. ISNN 2006. Lecture Notes in Computer Science, vol 3973. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760191_31
Download citation
DOI: https://doi.org/10.1007/11760191_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34482-7
Online ISBN: 978-3-540-34483-4
eBook Packages: Computer ScienceComputer Science (R0)