Abstract
In this paper, we present an approach for detecting and classifying attacks in computer networks by using neural networks. Specifically, a design of an intruder detection system is presented to protect the hypertext transfer protocol (HTTP). We propose the use of an application-based model using neural networks to model properly non-linear data. The benefit of this perspective is to work directly on the causes of an attack, which are determined directly by the commands used in the protected application. The intruder detection system is designed by defining three different neural networks, which include two multi-layer feed-forward networks and the Elman recurrent network. The results reported in this paper show that the Elman recurrent network achieved a performance around ninety percent of good detection, which demonstrates the reliability of the designed system to detect and classify attacks in high-level network protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Beale, and H. Demuth, Neural Network Toolbox, Math Works, Inc. Massachusetts, USA, (2003).
C. Bishop, Neural Networks for Pattern Recognition. Oxford University Press, Nueva York, USA, (1995).
A. Bivens, C. Palagiri, R. Smith, B. Szymanski, and M. Embrechts, Network-Based Intrusion Detection Using Neural Networks, Intelligent Engineering Systems through Artificial Neural Networks, Proc. of ANNIE-2002, vol. 12, ASME Press, New York, (2002) pp. 579–584.
S. Haykin S., Neural Networks: A Comprehensive Foundation, McMMillan, New York, (1994).
C. Manikopoulos, C. and S. Papavassiliou, Network Intrusion and Fault Detection: A Statistical Anomaly Approach, IEEE Communications Magazine, October (2002) pp. 76–82.
T. Masters, Practical Neural Network Recipes in C++, Academic Press, Inc. California, USA, (1993).
J. A. Mejia-Sanchez, Detección de Intrusos en Redes de Comunicaciones Utilizando Redes Neuronales, Department of Electrical and Electronic Engineering, Universidad de las Américas Puebla, Mexico, May (2004).
B. Mukherjee, L. T. Heberlein, and K. N. Levitt. Network Intrusion Detection, IEEE Net-work, May/June (1994).
J. P. Planquart, Application of Neural Networks to Intrusion Detection, SANS Institute, July (2001).
N. Pongratz, Application of Neural Networks to Recognize Computer Identity Hijacking, University of Wisconsin, (2001).
E. Torres, Immunologic System for intrusion detection at http protocol level, Department of Systems Engineering, Pontificia Universidad Javeriana, Colombia, May (2003).
S21SEC, http://www.s21scc.com
L. de Sa Silva, A. C. Ferrari dos Santos, J. D. S. Da Silva, A. Montes., A Neural Network Application for Attack Detection in Computer Networks, IEEE International Joint Conference on Neural Networks, Vol. 2, July (2004) pp. 1569–1574.
X. Jing-Sheng, S. Ji-Zhou, Z. Xu., Recurrent Network in Network Intrusion Detection System, IEEE International Conference on Machine Learning and Cybernetics, Vol. 5 August (2004) pp. 2676–2679.
Y. Bai, and H. Kobayashi, Intrusion Detection Systems: Technology and Development, IEEE International Conference on Advanced Information Networking and Application (AINA’ 03), (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Alarcon-Aquino, V., Mejia-Sanchez, J.A., Rosas-Romero, R., Ramirez-Cruz, J.F. (2006). Detecting and Classifying Attacks in Computer Networks Using Feed-Forward and Elman Neural Networks. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_19
Download citation
DOI: https://doi.org/10.1007/1-84628-352-3_19
Publisher Name: Springer, London
Print ISBN: 978-1-84628-311-6
Online ISBN: 978-1-84628-352-9
eBook Packages: Computer ScienceComputer Science (R0)