Abstract
The growth of the Internet and consequently, the number of interconnected computers through a shared medium, has exposed a lot of relevant information to intruders and attackers. Firewalls aim to detect violations to a predefined rule set and usually block potentially dangerous incoming traffic. However, with the evolution of the attack techniques, it is more difficult to distinguish anomalies from the normal traffic. Different intrusion detection approaches have been proposed, including the use of artificial intelligence techniques such as neural networks. In this paper, we present a network anomaly detection technique based on Probabilistic Self-Organizing Maps (PSOM) to differentiate between normal and anomalous traffic. The detection capabilities of the proposed system can be modified without retraining the map, but only modifying the activation probabilities of the units. This deals with fast implementations of Intrusion Detection Systems (IDS) necessary to cope with current link bandwidths.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alhoniemi, E., Himberg, J., Vesanto, J.: Probabilistic measures for responses of self-organizing map units. In: Proc. of the International ICSC Congress on Computational Intelligence Methods and Applications (CIMA), vol. 1, pp. 286–290 (1999)
Ghosh, J., Wanken, J., Charron, F.: Detecting anomalous and unknown intrusions against programs. In: Proc. of the Annual Computer Security Applications Conference, vol. 1, pp. 259–267 (1998)
Haykin, S.: Neural Networks, 2nd edn. Prentice-Hall (1999)
Hoffman, A., Schimitz, C., Sick, B.: Intrussion detection in computer networks with neural and fuzzy classifiers. In: International Conference on Artificial Neural Networks (ICANN), vol. 1, pp. 316–324 (2003)
Kohonen, T.: Self-Organizing Maps. Springer (2001)
Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendball, K.R., McClung, D., Weber, D., Webster, S.E., Wyschgrod, D., Cuningham, R.K., Zissman, M.A.: Evaluating intrusion detection systems: the 1998 darpa off-line intrusion detection evaluation. Descex 2, 1012–1027 (2000)
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa instrusion detection systems evaluation as performed by lyncoln laboratory. ACM Transactions on Information and Systems Security 3(4), 262–294 (2000)
Network Security Lab - Knowledge Discovery and Data MininG (NSL-KDD) (2007), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Padilla, P., López, M., Górriz, J.M., Ramírez, J., Salas-González, D., Álvarez, I.: The Alzheimer’s Disease Neuroimaging Initiative. NMF-SVM based CAD tool applied to functional brain images for the diagnosis of Alzheimer’s disease. IEEE Transactions on Medical Imaging 2, 207–216 (2012)
Panda, M., Abraham, A., Patra, M.R.: Discriminative multinomial naïve bayes for network intrusion detection. In: Proc. of the 6th International Conference on Information Assurance and Security, IAS (2010)
Riveiro, M., Johansson, F., Falkman, G., Ziemke, T.: Supporting maritime situation awareness using self organizing maps and gaussian mixture models. In: Proceedings of the 2008 Conference on Tenth Scandinavian Conference on Artificial Intelligence (SCAI), vol. 1, pp. 84–91 (2008)
Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Academic Press (2009)
Vesanto, J., Himberg, J., Alhoniemi, E., Parhankangas, J.: Som toolbox. Helsinki University of Technology (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
de la Hoz Franco, E., Ortiz García, A., Ortega Lopera, J., de la Hoz Correa, E., Prieto Espinosa, A. (2013). Network Anomaly Detection with Bayesian Self-Organizing Maps. In: Rojas, I., Joya, G., Gabestany, J. (eds) Advances in Computational Intelligence. IWANN 2013. Lecture Notes in Computer Science, vol 7902. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38679-4_53
Download citation
DOI: https://doi.org/10.1007/978-3-642-38679-4_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38678-7
Online ISBN: 978-3-642-38679-4
eBook Packages: Computer ScienceComputer Science (R0)