Network Intrusion Prevention by Using Hierarchical Self-Organizing Maps and Probability-Based Labeling

作者: Andres Ortiz , Julio Ortega , Antonio F. Díaz , Alberto Prieto

DOI: 10.1007/978-3-642-21501-8_29

关键词:

摘要: Nowadays, the growth of computer networks and expansion Internet have made security to be a critical issue. In fact, many proposals for Intrusion Detection/Prevention Systems (IDS/IPS) been proposed. These try avoid that corrupt or anomalous traffic reaches user application operating system. Nevertheless, most IDS/IPS only distinguish between normal can suspected potential attack. this paper, we present approach based on Growing Hierarchical Self-Organizing Maps (GHSOM) which not differentiate but also identify different known attacks. The proposed system has trained tested using well-known DARPA/NSL-KDD datasets results obtained are promising since detect over 99,4% 99,2 % attacker traffic. Moreover, on-line by probability labeling method presented paper.

参考文章(14)
Jan Wessnitzer, Barbara Webb, Darren Smith, A Model of Non-elemental Associative Learning in the Mushroom Body Neuropil of the Insect Brain international conference on adaptive and natural computing algorithms. pp. 488- 497 ,(2007) , 10.1007/978-3-540-71618-1_54
Gholam Reza Zargar, Peyman Kabiri, Selection of effective network parameters in attacks for intrusion detection international conference on data mining. pp. 643- 652 ,(2010) , 10.1007/978-3-642-14400-4_50
Esteban J Palomo, Enrique Domínguez, Rafael Marcos Luque, José Muñoz, Network security using growing hierarchical self-organizing maps international conference on adaptive and natural computing algorithms. pp. 130- 139 ,(2009) , 10.1007/978-3-642-04921-7_14
Teuvo Kohonen, Self-Organizing Maps ,(1995)
Chunlin Zhang, Ju Jiang, Mohamed Kamel, Intrusion detection using hierarchical neural networks Pattern Recognition Letters. ,vol. 26, pp. 779- 791 ,(2005) , 10.1016/J.PATREC.2004.09.045
Dominik Fisch, Alexander Hofmann, Bernhard Sick, On the versatility of radial basis function neural networks: A case study in the field of intrusion detection Information Sciences. ,vol. 180, pp. 2421- 2439 ,(2010) , 10.1016/J.INS.2010.02.023
Inshil Doh, Hayoung Oh, Kijoon Chae, ATTACK CLASSIFICATION BASED ON DATA MINING TECHNIQUE AND ITS APPLICATION FOR RELIABLE MEDICAL SENSOR COMMUNICATION International Journal of Computer Science & Applications. ,vol. 6, pp. 20- 32 ,(2009)
A. Rauber, D. Merkl, M. Dittenbach, The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data IEEE Transactions on Neural Networks. ,vol. 13, pp. 1331- 1341 ,(2002) , 10.1109/TNN.2002.804221
A.K. Ghosh, J. Wanken, F. Charron, Detecting anomalous and unknown intrusions against programs annual computer security applications conference. pp. 259- 267 ,(1998) , 10.1109/CSAC.1998.738646
P. Lichodzijewski, A. Nur Zincir-Heywood, M.I. Heywood, Host-based intrusion detection using self-organizing maps international joint conference on neural network. ,vol. 2, pp. 1714- 1719 ,(2002) , 10.1109/IJCNN.2002.1007776