Skip to main content

A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3758))

Abstract

Intrusion Detection is an essential and critical component of network security systems. The key ideas are to discover useful patterns or features that describe user behavior on a system, and use the set of relevant features to build classifiers that can recognize anomalies and known intrusions, hopefully in real time. In this paper, a hybrid neural network technique is proposed, which consists of the self-organizing map (SOM) and the radial basis function (RBF) network, aiming at optimizing the performance of the recognition and classification of novel attacks for intrusion detection. The optimal network architecture of the RBF network is determined automatically by the improved SOM algorithm. The intrusion feature vectors are extracted from a benchmark dataset (the KDD-99) designed by DARPA. The experimental results demonstrate that the proposed approach performance especially in terms of both efficient and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hofmann, A., Schmitz, C., Sick, B.: Rule extraction from neural networks for intrusion detection in computer networks. In: IEEE International Conference on Systems, Man and Cybernetics, October 5-8, vol. 2 (2003)

    Google Scholar 

  2. Denning, E.D.: An intrusion detection model. In: Proceedings of the IEEE Symposium on Security and Privacy, S&P 1986, pp. 118–133 (1986)

    Google Scholar 

  3. Cannady, J.: Artificial neural networks for misuse detection. In: Proceedings of the 1998 National Information Systems Security Conference (NISSC 1998), Arlington, VA, October 5-8, pp. 443–456 (1998)

    Google Scholar 

  4. Ghosh, A.K., Schwartzbard, A.: A study in using neural networks for anomaly and misuse detection. In: Proceedings of USENIX Security Symposium (1999)

    Google Scholar 

  5. Lippmann, R.P., Cunningham, R.K.: Improving intrusion detection performance using keyword selection and neural networks. Computer Networks (Amsterdam, Netherlands:1999) 34(4), 597–603 (1999)

    Google Scholar 

  6. Pan, Z.-S., Chen, S.-C., Hu, G.-B., Zhang, D.-Q.: Hybrid neural network and C4.5 for misuse detection. In: 2003 International Conference on Machine Learning and Cybernetics, November 2-5, vol. 4 (2003)

    Google Scholar 

  7. Cannady, J.: Applying CMAC-based online learning to intrusion detection. In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, IJCNN 2000, July 24-27, vol. 5 (2000)

    Google Scholar 

  8. Rapaka, A., Novokhodko, A., Wunsch, D.: Intrusion detection using radial basis function network on sequences of system calls. In: Proceedings of the International Joint Conference on Neural Networks, vol. 3 (2003)

    Google Scholar 

  9. Xiong, Q., Hirasawa, K., Hu, J., Murata, J.: Growing RBF structures using self-organizing maps. In: Proceedings of 9th IEEE International Workshop on Robot and Human Interactive Communication, RO-MAN 2000, September 27-29, pp. 107–111 (2000)

    Google Scholar 

  10. Ambwani, T.: Multi class support vector machine implementation to intrusion detection. In: Proceedings of the International Joint Conference on Neural Networks, July 20-24, vol. 3 (2003)

    Google Scholar 

  11. Kohonen, T.: Self-Organizing Maps. Springer, Berlin (1997)

    MATH  Google Scholar 

  12. Fritzke, B.: Growing cell structure: A self-organizing network for supervised and un-supervised learning. Neural Networks 7, 1441–1460 (1994)

    Article  Google Scholar 

  13. Wu, S., Chow, T.W.S.: Induction machine fault detection using SOM-based RBF neural networks. IEEE Transactions on Industrial Electronics 51(1), 183–194 (2004)

    Article  Google Scholar 

  14. Hettich, S., Bay, S.D.: The UCI KDD archive. Department of Information and Computer Science. University of California, Irvine (1999), http://kdd.ics.uci.edu

    Google Scholar 

  15. Lee, S.C., Heinbuch, D.V.: Training a neural-network based intrusion detector to recognize novel attacks. IEEE Transactions on Systems, Man and Cybernetics, Part A 31(4), 294–299 (2001)

    Article  Google Scholar 

  16. Ramadas, M., Ostermann, S., Tjaden, B.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 36–54. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Guan, Y., Ghorbani, A.A., Belacel, N.: Y-means: A clustering method for intrusion detection. In: Proceeding IEEE Canadian Conference on Electrical and Computer Engineering, pp. 1083–1086 (2003)

    Google Scholar 

  18. Lei, J.Z., Ghorbani, A.: Network intrusion detection using an improved competitive learning neural network. In: Proceedings Second Annual Conference on Communication Networks and Services Research, May 19-21, pp. 190–197 (2004)

    Google Scholar 

  19. Sung, A.H., Mukkamala, S.: Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings 2003 Symposium on Applications and the Internet, , Janaury 27-31 (2003)

    Google Scholar 

  20. Liu, Z., Florez, G., Bridges, S.M.: A comparison of input representations in neural networks: a case study in intrusion detection. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, May 12-17, vol. 2, pp. 1708–1713 (2002)

    Google Scholar 

  21. Liu, Z., Bridges, S.M., Vaughn, R.B.: Classification of anomalous traces of privileged and parallel programs by neural networks. In: The 12th IEEE International Conference on Fuzzy Systems, FUZZ 2003, May 25-28, vol. 2, pp. 1225–1230 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pan, W., Li, W. (2005). A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection. In: Pan, Y., Chen, D., Guo, M., Cao, J., Dongarra, J. (eds) Parallel and Distributed Processing and Applications. ISPA 2005. Lecture Notes in Computer Science, vol 3758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576235_58

Download citation

  • DOI: https://doi.org/10.1007/11576235_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29769-7

  • Online ISBN: 978-3-540-32100-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics