Skip to main content

An Anomaly Intrusion Detection Approach Using Cellular Neural Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4263))

Abstract

This paper presents an anomaly detection approach for the network intrusion detection based on Cellular Neural Networks (CNN) model. CNN has features with multi-dimensional array of neurons and local interconnections among cells. Recurrent Perceptron Learning Algorithm (RPLA) is used to learn the templates and bias in CNN classifier. Experiments with KDD Cup 1999 network traffic connections which have been preprocessed with methods of features selection and normalization have shown that CNN model is effective for intrusion detection. In contrast to back propagation neural network, CNN model exhibits an excellent performance owing to the higher attack detection rate with lower false positive rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghosh, A., Wanken, J., Charron, F.: Detecting anomalous and unknown intrusions against programs. In: Proc. 1998 Annual Computer Security Applications Conf., ACSAC 1998, December 1998, pp. 259–267. IEEE Computer Soc., Los Alamitos (1998)

    Google Scholar 

  2. Anderson, J.P.: Computer security threat monitoring and surveillance, Technical Report, James P. Anderson Company, Fort Washington, PA (April 1980)

    Google Scholar 

  3. Frank, J.: Artificial Intelligence and Intrusion Detection: Current and future directions. In: Proceedings of the 17th National Computer Security Conference (1994)

    Google Scholar 

  4. Helman, P., Bhangoo, J.A.: Statistically base system for prioritizing information exploration under uncertainty. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 27, 449–466 (1997)

    Article  Google Scholar 

  5. Ghosh, A., Schwartzbard, A.: A study in using neural networks for anomaly and misuse detection. In: Proceedings of the Eighth USENIX Security Symposium, pp. 141–152 (1999)

    Google Scholar 

  6. Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications 29(4), 713–722 (2005)

    Article  Google Scholar 

  7. Denning, D.E.: An intrusion detection model. IEEE Trans. S.E. SE-13 (2), 222–232 (1987)

    Article  Google Scholar 

  8. Veroerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer Communications 25, 1356–1365 (2002)

    Article  Google Scholar 

  9. KDD Cup 1999 Data (1999), http://kdd.ics.uci.edu/databases/kddcup.html

  10. Sung, A.H., Mukkamala, S.: Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings of international symposium on applications and the internet (SAINT 2003), pp. 209–217 (2003)

    Google Scholar 

  11. Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)

    Google Scholar 

  12. Chua, L.O., Yang, L.: Cellular Neural Networks: theory and application. IEEE Trans. Circuits and Systems 35, 1257–1290 (1998)

    Article  MathSciNet  Google Scholar 

  13. Pudov, S.: Learning of cellular neural networks. Future Generation Computer Systems 17, 689–697 (2001)

    Article  MATH  Google Scholar 

  14. Fortuna, L., Arena, P., Balya, D., Zarandy, A.: Cellular neural networks: a paradigm for nonlinear spatio-temporal processing. Circuits and Systems Magazine 1(4), 6–21 (2001)

    Article  Google Scholar 

  15. Guzelis, C., Karamahmut, S.: Recurrent Perceptron Learning Algorithm for Completely Stable Cellular Neural Networks. In: Proc. Third IEEE Int. Workshop on Cellular Neural Network and Applications, Rome, Italy, pp. 177–182 (1994)

    Google Scholar 

  16. Wun-Hwa, C., Sheng-Hsun, H., Hwang-Pin, S.: Application of SVM and ANN for intrusion detection. Computers & Operations Research 32, 2617–2634 (2005)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, Z., Karahoca, A. (2006). An Anomaly Intrusion Detection Approach Using Cellular Neural Networks. In: Levi, A., Savaş, E., Yenigün, H., Balcısoy, S., Saygın, Y. (eds) Computer and Information Sciences – ISCIS 2006. ISCIS 2006. Lecture Notes in Computer Science, vol 4263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11902140_94

Download citation

  • DOI: https://doi.org/10.1007/11902140_94

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47242-1

  • Online ISBN: 978-3-540-47243-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics