An Introduction to the Use of Neural Networks for Network Intrusion Detection

被引:0
作者
Bitter, Christian [1 ]
North, John [2 ]
Elizondo, David A. [2 ]
Watson, Tim [2 ]
机构
[1] De Montfort Univ, Dept Informat, Ctr Computat Intelligence, Leicester LE1 9BH, Leics, England
[2] De Montfort Univ, Dept Comp Technol, Comp Forens & Security Grp, Leicester LE1 9BH, Leics, England
来源
COMPUTATIONAL INTELLIGENCE FOR PRIVACY AND SECURITY | 2012年 / 394卷
关键词
SELF-ORGANIZING MAPS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situation where a security breach can have an impact on individuals, institutions and critical services, such as power and communication systems. This reliance, along with the possibility of remaining both anonymous and geographically separate from an intrusion, has made cyber-crime an attractive arena for criminals. To protect their assets organisations can use a multi-layered approach to security. As well as the other areas of access control, systems which can detect if malicious or unauthorised activity is occurring are becoming more and more prevalent; intrusion detection systems are at the centre of this. Of particular benefit to intrusion detection systems are any technique with the potential to identify previously unseen patterns, such as neural networks. This chapter is concerned with the state-of-the-art of using neural networks, as part of an intrusion detection system, to identify suspicious or malicious systems traffic. We examine host based systems (where all the information is gathered from a single host) and network based systems. We examine a cross section of different types of neural networks and their application to differing types of intrusion detection.
引用
收藏
页码:5 / +
页数:3
相关论文
共 27 条
  • [1] Ahmad I., 2009, SIN '09 Proceedings of the 2nd international conference on Security of information and networks, P229
  • [2] Alfantookh AA, 2006, J KING SAUD UNIV-COM, V18, P27
  • [3] [Anonymous], P 5 GERM LS DYNA FOR
  • [4] [Anonymous], 1973, Pattern Classification and Scene Analysis
  • [5] Bai J, 2006, LECT NOTES COMPUT SC, V3973, P255
  • [6] Barika F. A., 2009, Proceedings of the 2009 International Conference on Security & Management. SAM 2009, P271
  • [7] Betanzos AA, 2007, P EUR S ART NEUR NET, P579
  • [8] Bishop CM., 1995, NEURAL NETWORKS PATT
  • [9] Brugger T., 2007, KDNUGGETS NEWS
  • [10] Calado J, 2006, ADV INFO KNOW PROC, P305