Skip to main content

A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System

  • Conference paper
  • 2248 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4234))

Abstract

To make network intrusion detection systems can be used in Gigabit Ethernet, a distributed neural network learning algorithm (DNNL) is put forward to keep up with the increasing network throughput. The main idea of DNNL is splitting the overall traffic into subsets and several sensors learn them in parallel way. The advantage of this method is that the large data set can be split randomly thus reduce the complicacy of the splitting algorithm. The experiments are performed on the KDD’99 Data Set which is a standard intrusion detection benchmark. Comparisons with other approaches on the same benchmark show that DNNL can perform detection with high detection rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2002, pp. 285–294 (2002)

    Google Scholar 

  2. Lai, H.G., Cai, S.W., Huang, H., Xie, J.Y., Li, H.: A parallel intrusion detection system for high-speed networks. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 439–451. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Jiang, W.B., Song, H., Dai, Y.Q.: Real-time intrusion detection for high-speed networks. Computers & Security 24(4), 287–294 (2005)

    Article  Google Scholar 

  4. Xinidis, K., Charitakis, I., Antonatos, S., Anagnostakis, K.G., Markatos, E.P.: An active splitter architecture for intrusion detection and prevention. IEEE Transactions on Dependable and Secure Computing 3(1), 31–44 (2006)

    Article  Google Scholar 

  5. Schaelicke, L., Wheeler, K., Freeland, C.: SPANIDS: a scalable network intrusion detection loadbalancer. In: Proceedings of the 2nd conference on Computing frontiers, Ischia, Italy, May 4-6, 2005, pp. 315–322 (2005)

    Google Scholar 

  6. Wang, Y.X., Behera, S.R., Wong, J., Helmer, G., Honavar, V., Miller, L., Lutz, R., Slagell, M.: Towards the automatic generation of mobile agents for distributed intrusion detection system. The Journal of Systems and Software 79(1), 1–14 (2006)

    Article  Google Scholar 

  7. Bala, J., Weng, Y., Williams, A., Gogia, B.K., Lesser, H.K.: Applications of Distributed Mining Techniques For Knowledge Discovery in Dispersed Sensory Data. In: 7th Joint Conference on Information Sciences - JCIS 2003, Cary, NC, USA, September 26-30 (2003)

    Google Scholar 

  8. Kourai, K., Chiba, S.: HyperSpector virtual distributed monitoring environments for secure intrusion detection. In: Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments, Chicago, IL, USA, June 2005, pp. 197–207 (2005)

    Google Scholar 

  9. Folino, G., Pizzuti, C., Spezzano, G.: GP ensemble for distributed intrusion detection systems. In: Proceedings of the 3rd International Conference on Advanced in Pattern Recognition, Bath, UK, August 22-25, pp. 54–62 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Y., Tian, D., Yu, X., Wang, J. (2006). A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System. In: King, I., Wang, J., Chan, LW., Wang, D. (eds) Neural Information Processing. ICONIP 2006. Lecture Notes in Computer Science, vol 4234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893295_23

Download citation

  • DOI: https://doi.org/10.1007/11893295_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46484-6

  • Online ISBN: 978-3-540-46485-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics