Advertisement

Intrusion Detection System Based on a Cooperative Topology Preserving Method

  • Emilio Corchado
  • Álvaro Herrero
  • Bruno Baruque
  • José Manuel Sáiz

Abstract

This work describes ongoing multidisciplinary research which aims to analyse and to apply connectionist architectures to the interesting field of computer security. In this paper, we present a novel approach for Intrusion Detection Systems (IDS) based on an unsupervised connectionist model used as a method for classifying data. It is used in this special case, as a method to analyse the traffic which travels along the analysed network, detecting anomalous traffic patterns related to SNMP (Simple Network Management Protocol). Once the data has been collected and pre-processed, we use a novel connectionist topology preserving model to analyse the traffic data. It is an extension of the negative feedback network characterised by the use of lateral connections on the output layer. These lateral connections have been derived from the Rectified Gaussian distribution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Myerson, J.M. (2002) Identifying enterprise network vulnerabilities. International Journal of Network Management. 12(3).Google Scholar
  2. [2]
    Planquart, J-P. (2002) Application of Neural Networks to Intrusion Detection. Information Security Reading Room — SANS (SysAdmin, Audit, Network, Security) Institute.Google Scholar
  3. [3]
    Corchado, E., Fyfe, C. (2003) Orientation Selection Using Maximum Likelihood Hebbian Learning. International Journal of Knowledge-Based Intelligent Engineering Systems. 7(2).Google Scholar
  4. [4]
    Corchado, E., Han, Y., Fyfe, C. (2003) Structuring global responses of local filters using lateral connections. J. Exp. Theor. Artif. Intell. 15(4): 473–487.CrossRefzbMATHGoogle Scholar
  5. [5]
    Corchado, E., Fyfe, C. (2003) Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. International Journal of Pattern Recognition and Artificial Intelligence. 17(8): 1447–1466.CrossRefGoogle Scholar
  6. [6]
    Fyfe, C. (1996) A Neural Network for PCA and Beyond. Neural Processing Letters. 6:33–41.CrossRefGoogle Scholar
  7. [7]
    Seung, H.S., Socci, N.D., Lee, D. (1998) The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems, 10: 350.Google Scholar
  8. [8]
    Corchado, E., Corchado, J.M., Sáiz, L., Lara, A. (2004) Constructing a Global and Integral Model of Business Management Using a CBR system. First International Conference on Cooperative Design, Visualization and Engineering (CDVE 04).Google Scholar
  9. [9]
    Corchado, E., MacDonald, D., Fyfe, C. (2004) Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit, Data mining and Knowledge Discovery. Kluwer Academic Publishing. 8(3): 203–225.MathSciNetCrossRefGoogle Scholar
  10. [10]
    Fyfe, C., Corchado, E. (2002) Maximum Likelihood Hebbian Rules. European Symposium on Artificial Neural Networks.Google Scholar
  11. [11]
    Lunt, T., Tamaru, A., Gilham, F., Jaganathan, R., Neuman, P., Jalali, C. (1990) IDES: A Progress Report. Sixth Annual Computer Security Applications Conference.Google Scholar
  12. [12]
    Denning, D. (1987) An Intrusion Detection Model. IEEE Transactions on Software Engineering. SE-13(2).Google Scholar
  13. [13]
    Debar, H., Becker, M., Siboni, D. (1992) A Neural Network Component for an Intrusion Detection System. IEEE Symposium on Research in Computer Security and Privacy.Google Scholar
  14. [14]
    Cisco Secure Consulting. (2000) Vulnerability Statistics Report.Google Scholar
  15. [15]
    Case, J., Fedor, M.S., Schoffstall, M.L., Davin, C. (1990) Simple Network Management (SNMP). RFC-1157.Google Scholar
  16. [16]
    Oja, E. (1989) Neural Networks, Principal Components and Subspaces. International Journal of Neural Systems. 1: 61–68.MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer-Verlag/Wien 2005

Authors and Affiliations

  • Emilio Corchado
    • 1
  • Álvaro Herrero
    • 1
  • Bruno Baruque
    • 1
  • José Manuel Sáiz
    • 1
  1. 1.Department of Civil EngineeringUniversity of BurgosSpain

Personalised recommendations