Abstract
Intrusion detection systems have got the potential to provide the first line of defense against computer network attacks. However, this potential is far from being exploited considering the fact that most of commercial IDS in the market do not identify novel attacks and generate false alerts for legitimate user activities. They mainly deploy misuse detection and are fully dependant on human interaction. Neural networks can be applied successfully to tackle these issues and design better intrusion detection system. Neural networks have already been used to solve many problems related to pattern recognition, data mining, data compression and research is still underway with regards to intrusion detection systems. Unsupervised learning and fast network convergence are some features that can be integrated in the newly designed IDS system using neural networks. This study will aim to explore current applications of neural networks for intrusion detection systems and identify possible neural network algorithms suitable for the task in hand.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the practice of intrusion detection technologies (2000), http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr028.pdf
Anderson, J.: Computer security threat monitoring and surveillance (1980), http://csrc.nist.gov/publications/history/ande80.pdf
Beale, J.: Snort, IDS and IPS toolkit, p. 297. Syngress Publishing Inc., Canada (2007)
Cannady, J.: Artificial neural network for misuse detection (1998), http://csrc.nist.gov/nissc/1998/proceedings/paperF13.pdf
Cannady, J., Mahaffey, J.: The application of artificial neural networks to misuse detection (1999), http://freeworld.thc.org/root/docs/intrusion_detection/nids/Application-of-ANN-to-Misuse-Detection.pdf
Cunningham, R., Lippmann, R.: Improving intrusion detection performance using keyword selection and neural networks (1999), http://www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf
Denning, D.: An intrusion-detection model. IEEE Transactions on software engineering 13(2), 222–232 (1987), http://ieeexplore.ieee.org
Ghosh, A., Schwartzbard, A.: A study using neural networks for anomaly detection and misuse detection (1999), http://www.usenix.org/events/sec99/full_papers/ghosh/ghosh.pdf
Girardin, L., Brodbeck, D.: A visual approach for monitoring logs (1998), http://www.ubilab.org/publications/index.html
Gregg, M.: Certified Ethical Hacker, p. 368. Que Publishing, USA (2008)
Hagan, T., Demuth, H., Beale, M.: Neural network design. PWS Publishing, USA (1996)
Han, S., Kim, K., Cho, S.: Evolutionary learning program’s behavior in neural networks for anomaly detection (2004), http://www.springerlink.com/content/g807h4u4q3700529/
Kung, S.: Digital neural networks. Prentice Hall, USA (1993)
Northcutt, S., Novak, J.: Network Intrusion Detection, p. 53. New Riders Publishing, USA (2003)
Palmer-Brown, D., Lee, S.: Continuous reinforced snap-drift learning in a neural architecture for proxylet selection in active computer networks (2004), http://www.scs-europe.net/services/esm2004/pdf/esm-45.pdf
Pervez, S., Ahmad, I., Akram, A., Swati, S.: A comparative analysis of artificial neural network technologies in intrusion detection systems (2006), http://www.labplan.ufsc.br/congressos/WSEAS/papers/517-423.pdf
Planquet, J.: Application of neural networks to Intrusion Detection systems (2001), https://www2.sans.org/reading_room/whitepapers/detection/336.php
Plante, N.: Intrusion Detection Systems: A Practical Introduction (2004), http://www.ccs.neu.edu/home/nap/preso/ids-intro.ppt
Rehman, R.: Intrusion detection systems with Snort. Pearson Education Inc., USA (2003)
Schneier, B.: Secrets and Lies: Digital security in a networked world, p. 30. John Wiley and Sons Inc., USA (2004)
Silva, L., Santos, A., Silva, J., Montes, A.: A neural network application for attack detection in computer networks (2004), http://ieeexplore.ieee.org
Smith, S.: The Scientist & Engineer’s Guide to Digital Signal Processing. California Technical Publishing, USA (1998)
Werlinger, R., Hawkey, K., Muldner, K., Jaferiaan, P., Beznosov, K. (2008), The challenges of using an intrusion detection system: is it worth the effort? http://cups.cs.cmu.edu/soups/2008/proceedings/p107Werlinger.pdf
Zanero, S.: 360 degree anomaly based unsupervised ids (2007), http://www.blackhat.com/presentations/bh-dc-07/Zanero/Paper/bh-dc-07-Zanero-WP.pdf
Zhang, Z., Li, J., Manikopoulos, C., Jorgenson, J., Ucles, J.: HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification (2001), http://www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/paperT2A2(19).pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beqiri, E. (2009). Neural Networks for Intrusion Detection Systems. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds) Global Security, Safety, and Sustainability. ICGS3 2009. Communications in Computer and Information Science, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04062-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-04062-7_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04061-0
Online ISBN: 978-3-642-04062-7
eBook Packages: Computer ScienceComputer Science (R0)