Application of artificial neural networks and related techniques to intrusion detection

作者: Christian Bitter , David A. Elizondo , Tim Watson

DOI: 10.1109/IJCNN.2010.5596532

关键词:

摘要: The increasing complexity of today's information technology (IT) together with our dependency upon it, has led to a situation in which security breach not only effects for individuals but can also affect the availability critical services (power supply, communication) or result significant financial loss. Criminals and terrorists want exploit system vulnerabilities capitalise on modern society's interwovenness IT. To counter this, organisations try secure their IT assets enforce policies, be compliant legal regulatory requirements ultimately deter unauthorised intruders from gaining access them. At core, goal intrusion detection systems is identification suspicious traffic flowing within, leaving entering an organisation. identify such traffic, may focus data within single host integrated various network segments. Identified then reported responsible authorities take appropriate course action. This report concerned state-of-the-art systems. Systems leveraging gathered host, i.e. host-based systems, are presented as well approaches observing analysing across networks, network-based Specific placed that make use artificial neural networks variations thereof separate potentially malicious ordinary traffic.

参考文章(20)
Noelia Sánchez-Maroño, Beatriz Pérez-Sánchez, Amparo Alonso-Betanzos, Juan A. Suárez-Romero, Félix M. Carballal-Fortes, Classification of computer intrusions using functional networks. A comparative study. the european symposium on artificial neural networks. pp. 579- 584 ,(2007)
João Calado, José Sá da Costa, Fuzzy Neural Networks Applied to Fault Diagnosis Springer London. pp. 305- 334 ,(2006) , 10.1007/978-1-84628-631-5_10
Jie Bai, Yu Wu, Guoyin Wang, Simon X. Yang, Wenbin Qiu, A Novel Intrusion Detection Model Based on Multi-layer Self-Organizing Maps and Principal Component Analysis Advances in Neural Networks - ISNN 2006. pp. 255- 260 ,(2006) , 10.1007/11760191_37
David G. Stork, Richard O. Duda, Peter E. Hart, Pattern Classification (2nd ed.) ,(1999)
Álvaro Herrero, Emilio Corchado, None, Traffic Data Preparation for a Hybrid Network IDS hybrid artificial intelligence systems. pp. 247- 256 ,(2008) , 10.1007/978-3-540-87656-4_31
Álvaro Herrero, Emilio Corchado, María A Pellicer, Ajith Abraham, None, Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization hybrid intelligent systems. pp. 320- 328 ,(2007) , 10.1007/978-3-540-74972-1_42
Asim Karim, Computational Intelligence for Network Intrusion Detection: Recent Contributions Computational Intelligence and Security. pp. 170- 175 ,(2005) , 10.1007/11596448_25
Ray-I Chang, Liang-Bin Lai, Wen-De Su, Jen-Chieh Wang, Jen-Shaing Kouh, INTRUSION DETECTION BY BACKPROPAGATION NEURAL NETWORKS WITH SAMPLE-QUERY AND ATTRIBUTE-QUERY International Journal of Computational Intelligence Research. ,vol. 3, pp. 6- 10 ,(2007) , 10.5019/J.IJCIR.2007.76
Chih-Hung Wu, Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks Expert Systems with Applications. ,vol. 36, pp. 4321- 4330 ,(2009) , 10.1016/J.ESWA.2008.03.002
Abdulkader A. Alfantookh, DoS Attacks Intelligent Detection using Neural Networks Journal of King Saud University - Computer and Information Sciences. ,vol. 18, pp. 31- 51 ,(2006) , 10.1016/S1319-1578(06)80002-9