Abstract
This paper presents an application-based model for classifying and identifying attacks in a communications network and therefore guarantees its safety from HTTP protocol-based malicious commands. The proposed model is based on a recurrent neural network architecture and it is therefore suitable to work online and for analyzing non-linear patterns in real time to self-adjust to changes in its input environment. Three different neural network-based systems have been modelled and simulated for comparison purposes in terms of overall performance: a Feed-forward Neural Network, an Elman Network, and a Recurrent Neural Network. Simulation results show that the latter possesses a greater capacity than either of the others for the correct identification and classification of HTTP attacks, and it also reaches a result at a great speed, its somewhat taxing computing requirements notwithstanding.
Keywords
- Hide Layer
- Intrusion Detection
- Recurrent Neural Network
- Intrusion Detection System
- Structure Query Language
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
R. P. Lippmann, An Introduction to Computing with Neural Nets, in Neural Networks: Theoretical Foundations and Analysis, Edited by Clifford Lau, IEEE Press, 1992.
C. Lau, Artificial Neural Networks: Paradigms, Applications, and Hardware Implementations. IEEE Press, New Jersey. 1992. pp. 64- 90
B. Widrow, 30 Years of Adaptative Neural Networks:Perceptron, Madaline, and Backpropagation. Proc. IEEE, Vol. 78. 1990.
J. A. Anderson, An Introduction to Neural Networks. MIT Press, Cambridge, Massachusetts. 1997. pp. 12 - 52
S. Haykin, Neural Networks. Prentice Hall, 1998. pp. 274 - 298
V. Alarcon-Aquino, J.A. Mejía Sánchez, R. Rosas-Romero, J.F. Ramírez-Cruz., Detecting and Classifying Attacks in Computer Networks Using Feed-forward and Elman Neural Networks. Proceedings of the 1st European Conference on Computer Network Defense, EC2ND 2005, Wales, Uk. Springer Verlag 2005.
V. Alarcon-Aquino, J. A. Barria, Multi-resolution FIR Neural-Network-Based Learning Algorithm Applied to Network Traffic Prediction, IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Review, Vol. 36, Issue No. 2, March 2006. pp. 208-220
E. Torres, Sistema Inmunológico para la Detección de Intrusos a Nivel de Protocolo HTTP. Pontificia Universidad Javeriana, Bogotá, Colombia 2003.
Digital Security of the Future S21SEC URL http://www.s21sec.com.
P. Inella, The Evolution of Intrusion Detection Systems, Tetrad Digital Integrity, LLC. EE.UU., 2001. pp. 1 - 15
M. Embrechts, MetaNeural tm – Hands-on. Rensselaer Polytechnic Institute, Troy NY. 1993. pp. 1- 5, 8 - 13
J. Willams, D. Zipser, Gradient-Based Learning Algorithm for Recurrent Connectionist Networks. La Jolla, CA Press. California, 1990. pp 1-5
M. Mak, K. Ku, Y. Lu, On the improvement of the Real-Time Recurrent Learning Algorithm for Recurrent Neural Networks, Department of Electronic Engineering, Hong Kong Polytechnic University, Hong Kong, 1998. pp. 1- 4
M. Mak, Application of A Fast Real Time Recurrent Learning Algorithm to Text-to-Phoneme Conversion, Department. of Electronic Engineering, Hong Kong Polytechnic University, Hong Kong, 1995. pp. 1- 5
A. Bivens, C. Palagiri, R. Smith, B. Szymanski, and M. Embrechts, Network-Based Intrusion Detection Using Neural Networks, Intelligent Engineering Systems through Artificial Neural Networks, Proc. Of ANNIE-2002, vol. 12, ASME Press, New York, 2002 pp. 579-584.
C. Manikopoulos, C. and S. Papavassiliou, Network Intrusion and Fault Detection: A Statistical Anomaly Approach, IEEE Communications Magazine, October 2002, pp. 76-82.
J. P. Planquart, Application of Neural Networks to Intrusion Detection, SANS Institute, July 2001.
W. Lisheng, X. Zongben, Sufficient and Neural Networks, IEEE Transactions on Circuits and Systems I, Vol. 5, Issue 6, June 2006.
V. Alarcon-Aquino, J. A. Barria, Anomaly Detection in Communication Networks Using Wavelets, IEE-Proceedings-Communications, Vol.148, No.6; Dec. 2001; p.355-362
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Alarcon-Aquino, V., Oropeza-Clavel, C.A., Rodriguez-Asomoza, J., Starostenko, O., Rosas-Romero, R. (2010). Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_21
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_21
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)