Network Security Using Growing Hierarchical Self-Organizing Maps

被引:0
作者
Palomo, E. J. [1 ]
Dominguez, E. [1 ]
Luque, R. M. [1 ]
Munoz, J. [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, ETSI Informat, E-29071 Malaga, Spain
来源
ADAPTIVE AND NATURAL COMPUTING ALGORITHMS | 2009年 / 5495卷
关键词
Self-organization; network security; intrusion detection system; ANOMALY DETECTION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a hierarchical self-organizing neural network for intrusion detection. The proposed neural model consists of a hierarchical architecture composed of independent growing self-organizing maps (SOMs). The SOMs have shown to be successful for the analysis of high-dimensional input, data as in data mining applications such as network security. An intrusion detection system (IDS) monitors the IP packets flowing over the network to capture intrusions or anomalies. One of the techniques used for anomaly detection is building statistical models using metrics derived from observation of the user's actions. The proposed growing hierarchical SOM (GHSOM) address the limitations of the SOM related to their static architecture. Experimental results are provided by applying the well-known KDD Cup 1999 benchmark data set, which contains a great variety of simulated networks attacks. Randomly selected subsets that contain both attacks and normal records from this benchmark are used for training the GHSOM. Before training, a transformation for qualitative features present in the benchmark data set is proposed in order to compute distance among qualitative values. Comparative results with other related works are also provided.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 16 条
[1]   Dynamic self-organizing maps with controlled growth for knowledge discovery [J].
Alahakoon, D ;
Halgamuge, SK ;
Srinivasan, B .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2000, 11 (03) :601-614
[2]   Attack characterization and intrusion detection using an ensemble of self-organizing maps [J].
DeLooze, Lori L. .
2006 IEEE Information Assurance Workshop, 2006, :108-115
[3]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[4]   An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks [J].
Depren, O ;
Topallar, M ;
Anarim, E ;
Ciliz, MK .
EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) :713-722
[5]  
Dittenbach M, 2001, ADVANCES IN SELF-ORGANISING MAPS, P140
[6]  
He Y, 2002, 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, P1279, DOI 10.1109/ICMLC.2002.1167409
[7]   SELF-ORGANIZED FORMATION OF TOPOLOGICALLY CORRECT FEATURE MAPS [J].
KOHONEN, T .
BIOLOGICAL CYBERNETICS, 1982, 43 (01) :59-69
[8]  
Lee W, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P89, DOI 10.1109/DISCEX.2001.932195
[9]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[10]   Network intrusion detection using an improved competitive learning neural network [J].
Lei, JZ ;
Ghorbani, A .
SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, :190-197