ABSTRACT
Intrusion Detection System is based on the belief that an intruder's behavior will be noticeably different from that of a legitimate user and would exploit security vulnerabilities. This paper proposes a neural network approach to improve the alert throughput of a network and making it attack prohibitive using IDS. For evolving and testing intrusion the KDD CUP 99 dataset are used. The result of proposed approach is found to be more efficient in the area of Intrusion Detection and promises a good scope for further research.
- J. P. Anderson, "Computer Security Threat Monitoring and Surveillance", tech. report, James P. Anderson Co., Fort Washington, Pa., 1980.Google Scholar
- D. E. Denning, "An intrusion detection model" IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 222--232, 1987. Google ScholarDigital Library
- S. M. Bridges and R. B. Vaughn, "Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection", Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109--122, 2000.Google Scholar
- M. Moradi, and M. Zulkernine, "A Neural Network Based System for Intrusion Detection and Classification of Attacks" IEEE International Conference on Advances in Intelligent Systems - Theory and Applications, Luxembourg-Kirchberg, Luxembourg, November 15--18, 2004.Google Scholar
- University of California at Irvine, 1999. KDD Cup: <http://kdd.ics.uci.edu/databases/kddcup99/task.htm>.Google Scholar
- MIT Lincoln Laboratory, 1999 DARPA intrusion detection evaluation: design and procedures, DARPA Technical Report 1062_http://www.ll.mit.edu. Feb. 2001.Google Scholar
- J. Ryan, M. Lin, and R. Miikkulainen, "Intrusion Detection with Neural Networks" AI Approaches to Fraud Detection and Risk Management: Papers from the 1997 AAAI Workshop, Providence, RI, pp. 72--79, 1997.Google Scholar
- James Cannady, "Artificial neural networks for misuse detection" Proceedings of the 1998 National Information Systems Security Conference (NISSC'98), Arlington, VA, 1998.Google Scholar
- R. Cunningham and R. Lippmann, "Improving intrusion detection performance using keyword selection and neural networks" Proceedings of the International Symposium on Recent Advances in Intrusion Detection, Purdue, IN, 1999.Google Scholar
- Srinivas Mukkamala, "Intrusion detection using neural networks and support vector machine" Proceedings of the 2002 IEEE International Honolulu, HI, 2002.Google Scholar
- D. F. Specht, "A general regression neural network" IEEE Trans. Neural Network, vol. 2, no. 6, pp. 568--576, 1991.Google ScholarDigital Library
- M. Timothy, "Advanced Algorithms for Neural Networks: AC++ Sourcebook," Wiley, Canada, 1995. Google ScholarDigital Library
- E. Parzen, "On estimation of a probability density function and mode," Ann. Math. Statist.33 pp. 1065--1076, 1962Google ScholarCross Ref
Index Terms
- Neural network approach for intrusion detection
Recommendations
An Adaptive Rule-Based Intrusion Alert Correlation Detection Method
ICNDC '10: Proceedings of the 2010 First International Conference on Networking and Distributed ComputingIntrusion detection system (IDS) is a security layer that is used to discover ongoing intrusive attacks and anomaly activities in information systems and is usually working in a dynamically changing environment. Although increasing IDSs are developed in ...
An Efficient Approach to Develop an Intrusion Detection System Based on Multi Layer Backpropagation Neural Network Algorithm: IDS using BPNN Algorithm
SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People ResearchThe key success factor of the business depends upon correct and timely information. The vital resources of the organization should be protected from inside and outside threats. Among many threats of network security, intrusion has become a crucial ...
Enhancing Intrusion Detection System with proximity information
Intrusion Detection Systems (IDSes) proposed to identify or prevent the wide spread of worms can be largely classified as signature-based or anomaly-based. Modern worms are often sufficiently intelligent to hide their activities and evade anomaly ...
Comments