Abstract
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situation where a security breach can have an impact on individuals, institutions and critical services, such as power and communication systems. This reliance, along with the possibility of remaining both anonymous and geographically separate from an intrusion, has made cyber-crime an attractive arena for criminals. To protect their assets organisations can use a multi-layered approach to security. As well as the other areas of access control, systems which can detect if malicious or unauthorised activity is occurring are becoming more and more prevalent; intrusion detection systems are at the centre of this. Of particular benefit to intrusion detection systems are any technique with the potential to identify previously unseen patterns, such as neural networks. This chapter is concerned with the state-of-the-art of using neural networks, as part of an intrusion detection system, to identify suspicious or malicious systems traffic. We examine host based systems (where all the information is gathered from a single host) and network based systems. We examine a cross section of different types of neural networks and their application to differing types of intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Corona, I., Giacinto, G., Mazzariello, C., Roli, F., Sansone, C.: Information fusion for computer security: State of the art and open issues. Information Fusion 10(4), 274–284 (2009); Special Issue on Information Fusion in Computer Security
Alfantookh, A.A.: Dos attacks intelligent detection using neural networks. Journal of King Saud University. Computer & Information Sciences 18(1), 27–44 (2005)
Barika, F., Hadjar, K., El-Kadhi, N.: Artificial neural network for mobile ids solution. In: Security and Management, pp. 271–277 (2009)
Young, G., Pescatore, J.: Magic quadrant for network intrusion prevention system appliances. Gartner Core RAS Research Note G00167303, pp. 1–12 (April 2009)
Bishop, C.: Neural Networks for Pattern Recognition. Clarendon Press (1995)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley Interscience (2000)
Jiawei, H., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2006)
Iftikhar, A., Abdullah, A.B., Alghamdi, A.S.: Application of artificial neural network in detection of dos attacks. In: SIN 2009: Proceedings of the 2nd International Conference on Security of Information and Networks, pp. 229–234. ACM, New York (2009)
Beyer, W., Liebscher, M., Beer, M., Graf, W.: Neural network based response surface methods - a comparative study. 5th German LS-DYNA Forum, pp. 29–38 (October 2006)
Zhu, B., Shajari, M., Onut, I.V., Kabiri, P.: Evaluation Criteria. In: Network Intrusion Detection and Prevention Concepts and Techniques. Advances in Information Security, vol. 47, pp. 161–182. Springer, Heidelberg (2010)
Chang, R.I., Lai, L.B., Su, W.D., Wang, J.C., Kouh, J.S.: Intrusion detection by backpropagation neural networks with sample-query and attribute-query. International Journal of Computational Intelligence Research 3(1), 6–10 (2007)
Wu, C.H.: Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Systems With Applications 36(3, Part 1), 4321–4330 (2009)
Herrero, A., Corchado, E., Pellicer, M.A., Abraham, A.: Hybrid multi agent-neural network intrusion detection with mobile visualization. Innovations in Hybrid Intelligent Systems 44, 320–328 (2007)
Alonso-Betanzos, A., Sánchez-Maroño, N., Carballal-Fortes, F.M., Suárez-Romero, J.A., Pérez-Sánchez, B.: Classification of computer intrusions using functional networks - a comparative study. In: ESANN, pp. 579–584 (2007)
Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y.: Application of artificial neural networks techniques to computer worm detection. In: International Joint Conference on Neural Networks (IJCNN), pp. 2362–2369 (2006)
Bai, J., Wu, Y., Wang, G., Yang, S.X., Qiu, W.: A Novel Intrusion Detection Model Based on Multi-Layer Self-Organizing Maps and Principal Component Analysis. In: Wang, J., Yi, Z., Żurada, J.M., Lu, B.-L., Yin, H. (eds.) ISNN 2006. LNCS, vol. 3973, pp. 255–260. Springer, Heidelberg (2006)
Mitrokotsa, A., Douligeris, C.: Detecting denial of service attacks using emergent self-organizing maps. In: International Symposium on Signal Processing and Information Technology, pp. 375–380 (2005)
Calado, J., da Costa, J.S.: Fuzzy Neural Networks Applied to Fault Diagnosis. Advanced Information and Knowledge Processing. In: Computational Intelligence in Fault Diagnosis, pp. 305–334. Springer, London (2006)
Shafi, K., Abbass, H.: Biologically-inspired complex adaptive systems approaches to network intrusion detection. Information Security Technical Report 12(4), 209–217 (2007)
Karim, A.: Computational Intelligence for Network Intrusion Detection: Recent Contributions. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3801, pp. 170–175. Springer, Heidelberg (2005)
Herrero, Á., Corchado, E.: Traffic Data Preparation for a Hybrid Network IDS. In: Corchado, E., Abraham, A., Pedrycz, W. (eds.) HAIS 2008. LNCS (LNAI), vol. 5271, pp. 247–256. Springer, Heidelberg (2008)
Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications 28(2), 167–182 (2005); Computational Intelligence on the Internet
Yin, H.: The Self-Organizing Maps: Background, Theories, Extensions and Applications. In: Computational Intelligence: A Compendium. SCI, vol. 115, pp. 715–762. Springer, Heidelberg (2008)
Brugger, T.: Kdd cup ’99 dataset (network intrusion) considered harmful (September 2007), http://www.kdnuggets.com/news/2007/n18/4i.html (last accessed November 19, 2009)
Mukkamala, S., Sung, A.H.: Identifying significant features for network forensic analysis using artificial intelligence techniques. International Journal of Digital Evidence (IJDE) 1(4), 1–17 (2003)
El-Melegy, M.T., Essai, M.H., Ali, A.A.: Robust Training of Artificial Feedforward Neural Networks. In: Hassanien, A.-E., Abraham, A., Vasilakos, A.V., Pedrycz, W. (eds.) Foundations of Computational, Intelligence Volume 1. SCI, vol. 201, pp. 217–242. Springer, Heidelberg (2009)
El-Bakry, H.M., Hamada, M.: A New Implementation for Neural Networks in Fourier-Space. In: Hassanien, A.-E., Abraham, A., Vasilakos, A.V., Pedrycz, W. (eds.) Foundations of Computational, Intelligence Volume 1. SCI, vol. 201, pp. 307–330. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bitter, C., North, J., Elizondo, D.A., Watson, T. (2012). An Introduction to the Use of Neural Networks for Network Intrusion Detection. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-25237-2_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25236-5
Online ISBN: 978-3-642-25237-2
eBook Packages: EngineeringEngineering (R0)