Skip to main content

A Mutated Intrusion Detection System Using Principal Component Analysis and Time Delay Neural Network

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3973))

Abstract

The Intrusion Detection System (IDS) is generally used the misuse detection model based on rules because this model has low false alarm rates. However, the rule based IDSs are not efficient for mutated attacks, because they need additional rules for the variations of the attacks. In this paper, we propose an intrusion detection system using the Principal Component Analysis (PCA) and the Time Delay Neural Network (TDNN). Packets on the network can be considered as gray images of which pixels represent bytes of the packets. From these continuous packet images, we extract principal components. And these components are used as an input of a TDNN classifier that discriminates between normal and abnormal packet flows. The system deals well with various mutated attacks, as well as well-known attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sekar, R., Guang, Y., Verma, S., Shanbhag, T.: A High-Performance Network Intrusion Detection System. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 8–17. ACM Press, New York (1999)

    Chapter  Google Scholar 

  2. Paxson, V.: Bro: A System for Detecting Network Intruders in Real-time. Computer Networks 31(23-24), 2435–2463 (1999)

    Article  Google Scholar 

  3. Giacinto, G., Roli, F., Didaci, L.: Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks. Pattern Recognition Letters 24(12), 1795–1803 (2003)

    Article  Google Scholar 

  4. http://www.snort.org

  5. McCanne, S., Jacobson, V.: The BSD Packet Filter: A New Architecture for User-level Packet Capture. In: Proceedings of the 1993 Winter USENIX Conference, pp. 259–269 (1993)

    Google Scholar 

  6. Quinn, B., Shute, D.: Windows Sockets Network Programming. Addison-Wesley Professional, Reading (1996)

    Google Scholar 

  7. Johnson, R.A., Wichern, D.W.: Applied Multivariate Statistical Analysis, pp. 356–395. Prentice-Hall, Englewood Cliffs (2002)

    Google Scholar 

  8. Waibel, A., Hanazawa, T., Hinton, G., Shikano, K., Lang, K.J.: Phoneme Recognition Using Time-Delay Neural Networks. IEEE Transactions on Acoustics, Speech, and Signal Processing ASSP 37(3), 328–339 (1989)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, BD. et al. (2006). A Mutated Intrusion Detection System Using Principal Component Analysis and Time Delay Neural Network. In: Wang, J., Yi, Z., Zurada, J.M., Lu, BL., Yin, H. (eds) Advances in Neural Networks - ISNN 2006. ISNN 2006. Lecture Notes in Computer Science, vol 3973. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760191_36

Download citation

  • DOI: https://doi.org/10.1007/11760191_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34482-7

  • Online ISBN: 978-3-540-34483-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics