Intrusion detection with neural networks

被引:0
|
作者
Ryan, J [1 ]
Lin, MJ [1 ]
Miikkulainen, R [1 ]
机构
[1] MCI Commun Corp, Austin, TX 78753 USA
来源
ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 10 | 1998年 / 10卷
关键词
D O I
暂无
中图分类号
B84 [心理学]; C [社会科学总论]; Q98 [人类学];
学科分类号
03 ; 0303 ; 030303 ; 04 ; 0402 ;
摘要
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is through monitoring unusual user activity. Methods of intrusion detection based on hand-coded rule sets or predicting commands on-line are laborous to build or not very reliable. This paper proposes a new way of applying neural networks to detect intrusions. We believe that a user leaves a 'print' when using the system; a neural network can be used to learn this print and identify each user much like detectives use thumbprints to place people at crime scenes. If a user's behavior does not match his/her print, the system administrator can be alerted of a possible security breech. A backpropagation neural network called NNID (Neural Network Intrusion Detector) was trained in the identification task and tested experimentally on a system of 10 users. The system was 96% accurate in detecting unusual activity, with 7% false alarm rate. These results suggest that learning user profiles is an effective way for detecting intrusions.
引用
收藏
页码:943 / 949
页数:7
相关论文
共 50 条
  • [1] Neural Networks for Intrusion Detection Systems
    Beqiri, Elidon
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 156 - 165
  • [2] Agents and Neural Networks for Intrusion Detection
    Herrero, Alvaro
    Corchado, Emilio
    PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 155 - 162
  • [3] Application of Neural Networks for Intrusion Detection in Tor Networks
    Ishitaki, Taro
    Elmazi, Donald
    Liu, Yi
    Oda, Tetsuya
    Barolli, Leonard
    Uchida, Kazunori
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 67 - 72
  • [4] Neural networks applied in intrusion detection systems
    Bonifacio, JM
    Cansian, AM
    de Carvalho, ACPLF
    Moreira, ES
    IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, 1998, : 205 - 210
  • [5] Applications of neural networks in network intrusion detection
    Lazarevic, Aleksandar
    Pokrajac, Dragoljub
    Nikolic, Jelena
    NEUREL 2006: EIGHT SEMINAR ON NEURAL NETWORK APPLICATIONS IN ELECTRICAL ENGINEERING, PROCEEDINGS, 2006, : 59 - +
  • [6] Graph Neural Networks for Intrusion Detection: A Survey
    Bilot, Tristan
    Madhoun, Nour El
    Al Agha, Khaldoun
    Zouaoui, Anis
    IEEE ACCESS, 2023, 11 : 49114 - 49139
  • [7] USING NEURAL NETWORKS IN INTRUSION DETECTION SYSTEMS
    Merhaut, Filip
    Zelinka, Ivan
    MENDEL 2008, 2008, : 172 - 174
  • [8] Neural Networks for Intrusion Detection and Its Applications
    Reddy, E. Kesavulu
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1210 - 1214
  • [9] Intrusion detection using hierarchical neural networks
    Zhang, CL
    Jiang, J
    Kamel, M
    PATTERN RECOGNITION LETTERS, 2005, 26 (06) : 779 - 791
  • [10] Investigating supervised neural networks to intrusion detection
    Ahmad, Iftikhar
    Abdullah, Azween
    Alghamdi, Abdullah
    ICIC Express Letters, 2010, 4 (6 A): : 2133 - 2138