Skip to main content

An Introduction to the Use of Neural Networks for Network Intrusion Detection

  • Chapter
  • First Online:
Computational Intelligence for Privacy and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 394))

Abstract

Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situation where a security breach can have an impact on individuals, institutions and critical services, such as power and communication systems. This reliance, along with the possibility of remaining both anonymous and geographically separate from an intrusion, has made cyber-crime an attractive arena for criminals. To protect their assets organisations can use a multi-layered approach to security. As well as the other areas of access control, systems which can detect if malicious or unauthorised activity is occurring are becoming more and more prevalent; intrusion detection systems are at the centre of this. Of particular benefit to intrusion detection systems are any technique with the potential to identify previously unseen patterns, such as neural networks. This chapter is concerned with the state-of-the-art of using neural networks, as part of an intrusion detection system, to identify suspicious or malicious systems traffic. We examine host based systems (where all the information is gathered from a single host) and network based systems. We examine a cross section of different types of neural networks and their application to differing types of intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Corona, I., Giacinto, G., Mazzariello, C., Roli, F., Sansone, C.: Information fusion for computer security: State of the art and open issues. Information Fusion 10(4), 274–284 (2009); Special Issue on Information Fusion in Computer Security

    Article  Google Scholar 

  2. Alfantookh, A.A.: Dos attacks intelligent detection using neural networks. Journal of King Saud University. Computer & Information Sciences 18(1), 27–44 (2005)

    Google Scholar 

  3. Barika, F., Hadjar, K., El-Kadhi, N.: Artificial neural network for mobile ids solution. In: Security and Management, pp. 271–277 (2009)

    Google Scholar 

  4. Young, G., Pescatore, J.: Magic quadrant for network intrusion prevention system appliances. Gartner Core RAS Research Note G00167303, pp. 1–12 (April 2009)

    Google Scholar 

  5. Bishop, C.: Neural Networks for Pattern Recognition. Clarendon Press (1995)

    Google Scholar 

  6. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley Interscience (2000)

    Google Scholar 

  7. Jiawei, H., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2006)

    MATH  Google Scholar 

  8. Iftikhar, A., Abdullah, A.B., Alghamdi, A.S.: Application of artificial neural network in detection of dos attacks. In: SIN 2009: Proceedings of the 2nd International Conference on Security of Information and Networks, pp. 229–234. ACM, New York (2009)

    Google Scholar 

  9. Beyer, W., Liebscher, M., Beer, M., Graf, W.: Neural network based response surface methods - a comparative study. 5th German LS-DYNA Forum, pp. 29–38 (October 2006)

    Google Scholar 

  10. Zhu, B., Shajari, M., Onut, I.V., Kabiri, P.: Evaluation Criteria. In: Network Intrusion Detection and Prevention Concepts and Techniques. Advances in Information Security, vol. 47, pp. 161–182. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Chang, R.I., Lai, L.B., Su, W.D., Wang, J.C., Kouh, J.S.: Intrusion detection by backpropagation neural networks with sample-query and attribute-query. International Journal of Computational Intelligence Research 3(1), 6–10 (2007)

    Article  Google Scholar 

  12. Wu, C.H.: Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Systems With Applications 36(3, Part 1), 4321–4330 (2009)

    Article  Google Scholar 

  13. Herrero, A., Corchado, E., Pellicer, M.A., Abraham, A.: Hybrid multi agent-neural network intrusion detection with mobile visualization. Innovations in Hybrid Intelligent Systems 44, 320–328 (2007)

    Article  Google Scholar 

  14. Alonso-Betanzos, A., Sánchez-Maroño, N., Carballal-Fortes, F.M., Suárez-Romero, J.A., Pérez-Sánchez, B.: Classification of computer intrusions using functional networks - a comparative study. In: ESANN, pp. 579–584 (2007)

    Google Scholar 

  15. Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y.: Application of artificial neural networks techniques to computer worm detection. In: International Joint Conference on Neural Networks (IJCNN), pp. 2362–2369 (2006)

    Google Scholar 

  16. Bai, J., Wu, Y., Wang, G., Yang, S.X., Qiu, W.: A Novel Intrusion Detection Model Based on Multi-Layer Self-Organizing Maps and Principal Component Analysis. In: Wang, J., Yi, Z., Żurada, J.M., Lu, B.-L., Yin, H. (eds.) ISNN 2006. LNCS, vol. 3973, pp. 255–260. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Mitrokotsa, A., Douligeris, C.: Detecting denial of service attacks using emergent self-organizing maps. In: International Symposium on Signal Processing and Information Technology, pp. 375–380 (2005)

    Google Scholar 

  18. Calado, J., da Costa, J.S.: Fuzzy Neural Networks Applied to Fault Diagnosis. Advanced Information and Knowledge Processing. In: Computational Intelligence in Fault Diagnosis, pp. 305–334. Springer, London (2006)

    Chapter  Google Scholar 

  19. Shafi, K., Abbass, H.: Biologically-inspired complex adaptive systems approaches to network intrusion detection. Information Security Technical Report 12(4), 209–217 (2007)

    Google Scholar 

  20. Karim, A.: Computational Intelligence for Network Intrusion Detection: Recent Contributions. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3801, pp. 170–175. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  21. Herrero, Á., Corchado, E.: Traffic Data Preparation for a Hybrid Network IDS. In: Corchado, E., Abraham, A., Pedrycz, W. (eds.) HAIS 2008. LNCS (LNAI), vol. 5271, pp. 247–256. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  22. Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications 28(2), 167–182 (2005); Computational Intelligence on the Internet

    Article  Google Scholar 

  23. Yin, H.: The Self-Organizing Maps: Background, Theories, Extensions and Applications. In: Computational Intelligence: A Compendium. SCI, vol. 115, pp. 715–762. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  24. Brugger, T.: Kdd cup ’99 dataset (network intrusion) considered harmful (September 2007), http://www.kdnuggets.com/news/2007/n18/4i.html (last accessed November 19, 2009)

  25. Mukkamala, S., Sung, A.H.: Identifying significant features for network forensic analysis using artificial intelligence techniques. International Journal of Digital Evidence (IJDE) 1(4), 1–17 (2003)

    Google Scholar 

  26. El-Melegy, M.T., Essai, M.H., Ali, A.A.: Robust Training of Artificial Feedforward Neural Networks. In: Hassanien, A.-E., Abraham, A., Vasilakos, A.V., Pedrycz, W. (eds.) Foundations of Computational, Intelligence Volume 1. SCI, vol. 201, pp. 217–242. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  27. El-Bakry, H.M., Hamada, M.: A New Implementation for Neural Networks in Fourier-Space. In: Hassanien, A.-E., Abraham, A., Vasilakos, A.V., Pedrycz, W. (eds.) Foundations of Computational, Intelligence Volume 1. SCI, vol. 201, pp. 307–330. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Bitter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bitter, C., North, J., Elizondo, D.A., Watson, T. (2012). An Introduction to the Use of Neural Networks for Network Intrusion Detection. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25237-2_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25236-5

  • Online ISBN: 978-3-642-25237-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics