Training a neural-network based intrusion detector to recognize novel attacks

作者: S.C. Lee , D.V. Heinbuch

DOI: 10.1109/3468.935046

关键词: Artificial neural networkPattern recognition (psychology)Protocol (object-oriented programming)Intrusion detection systemData miningHost-based intrusion detection systemComputer scienceIntrusion prevention systemDetectorBackpropagationAnomaly-based intrusion detection system

摘要: While many commercial intrusion detection systems (IDS) are deployed, the protection they afford is modest. State-of-the-art IDS produce voluminous alerts, most false alarms, and function mainly by recognizing signatures of known attacks so that novel slip past them. Attempts have been made to create recognize signature "normal," in hope will then detect attacks, or novel. These often confounded extreme variability nominal behavior. The paper describes an experiment with composed a hierarchy neural networks (NN) functions as true anomaly detector. This result achieved monitoring selected areas network behavior, such protocols, predictable advance. this does not cover entire attack space, considerable number carried out violating expectations protocol/operating system designer. Within focus, NNs trained using data spans normal space. detectors able were specifically presented during training. We show small gives better than single large Some techniques can be used only anomalies, but distinguish among

参考文章(7)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
Christopher M. Bishop, Neural networks for pattern recognition ,(1995)
P. Sinha, N. Suri, Identification of test cases using a formal approach ieee international symposium on fault tolerant computing. pp. 314- 321 ,(1999) , 10.1109/FTCS.1999.781066
Teuvo Kohonen, Self-Organizing Maps ,(1995)
H.S. Javitz, A. Valdes, The SRI IDES statistical anomaly detector ieee symposium on security and privacy. pp. 316- 326 ,(1991) , 10.1109/RISP.1991.130799
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894