Skip to main content

Neural Networks for Intrusion Detection Systems

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 45))

Abstract

Intrusion detection systems have got the potential to provide the first line of defense against computer network attacks. However, this potential is far from being exploited considering the fact that most of commercial IDS in the market do not identify novel attacks and generate false alerts for legitimate user activities. They mainly deploy misuse detection and are fully dependant on human interaction. Neural networks can be applied successfully to tackle these issues and design better intrusion detection system. Neural networks have already been used to solve many problems related to pattern recognition, data mining, data compression and research is still underway with regards to intrusion detection systems. Unsupervised learning and fast network convergence are some features that can be integrated in the newly designed IDS system using neural networks. This study will aim to explore current applications of neural networks for intrusion detection systems and identify possible neural network algorithms suitable for the task in hand.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the practice of intrusion detection technologies (2000), http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr028.pdf

  2. Anderson, J.: Computer security threat monitoring and surveillance (1980), http://csrc.nist.gov/publications/history/ande80.pdf

  3. Beale, J.: Snort, IDS and IPS toolkit, p. 297. Syngress Publishing Inc., Canada (2007)

    Google Scholar 

  4. Cannady, J.: Artificial neural network for misuse detection (1998), http://csrc.nist.gov/nissc/1998/proceedings/paperF13.pdf

  5. Cannady, J., Mahaffey, J.: The application of artificial neural networks to misuse detection (1999), http://freeworld.thc.org/root/docs/intrusion_detection/nids/Application-of-ANN-to-Misuse-Detection.pdf

  6. Cunningham, R., Lippmann, R.: Improving intrusion detection performance using keyword selection and neural networks (1999), http://www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf

  7. Denning, D.: An intrusion-detection model. IEEE Transactions on software engineering 13(2), 222–232 (1987), http://ieeexplore.ieee.org

    Article  Google Scholar 

  8. Ghosh, A., Schwartzbard, A.: A study using neural networks for anomaly detection and misuse detection (1999), http://www.usenix.org/events/sec99/full_papers/ghosh/ghosh.pdf

  9. Girardin, L., Brodbeck, D.: A visual approach for monitoring logs (1998), http://www.ubilab.org/publications/index.html

  10. Gregg, M.: Certified Ethical Hacker, p. 368. Que Publishing, USA (2008)

    Google Scholar 

  11. Hagan, T., Demuth, H., Beale, M.: Neural network design. PWS Publishing, USA (1996)

    Google Scholar 

  12. Han, S., Kim, K., Cho, S.: Evolutionary learning program’s behavior in neural networks for anomaly detection (2004), http://www.springerlink.com/content/g807h4u4q3700529/

  13. Kung, S.: Digital neural networks. Prentice Hall, USA (1993)

    MATH  Google Scholar 

  14. Northcutt, S., Novak, J.: Network Intrusion Detection, p. 53. New Riders Publishing, USA (2003)

    Google Scholar 

  15. Palmer-Brown, D., Lee, S.: Continuous reinforced snap-drift learning in a neural architecture for proxylet selection in active computer networks (2004), http://www.scs-europe.net/services/esm2004/pdf/esm-45.pdf

  16. Pervez, S., Ahmad, I., Akram, A., Swati, S.: A comparative analysis of artificial neural network technologies in intrusion detection systems (2006), http://www.labplan.ufsc.br/congressos/WSEAS/papers/517-423.pdf

  17. Planquet, J.: Application of neural networks to Intrusion Detection systems (2001), https://www2.sans.org/reading_room/whitepapers/detection/336.php

  18. Plante, N.: Intrusion Detection Systems: A Practical Introduction (2004), http://www.ccs.neu.edu/home/nap/preso/ids-intro.ppt

  19. Rehman, R.: Intrusion detection systems with Snort. Pearson Education Inc., USA (2003)

    Google Scholar 

  20. Schneier, B.: Secrets and Lies: Digital security in a networked world, p. 30. John Wiley and Sons Inc., USA (2004)

    Google Scholar 

  21. Silva, L., Santos, A., Silva, J., Montes, A.: A neural network application for attack detection in computer networks (2004), http://ieeexplore.ieee.org

  22. Smith, S.: The Scientist & Engineer’s Guide to Digital Signal Processing. California Technical Publishing, USA (1998)

    Google Scholar 

  23. Werlinger, R., Hawkey, K., Muldner, K., Jaferiaan, P., Beznosov, K. (2008), The challenges of using an intrusion detection system: is it worth the effort? http://cups.cs.cmu.edu/soups/2008/proceedings/p107Werlinger.pdf

  24. Zanero, S.: 360 degree anomaly based unsupervised ids (2007), http://www.blackhat.com/presentations/bh-dc-07/Zanero/Paper/bh-dc-07-Zanero-WP.pdf

  25. Zhang, Z., Li, J., Manikopoulos, C., Jorgenson, J., Ucles, J.: HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification (2001), http://www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/paperT2A2(19).pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beqiri, E. (2009). Neural Networks for Intrusion Detection Systems. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds) Global Security, Safety, and Sustainability. ICGS3 2009. Communications in Computer and Information Science, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04062-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04062-7_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04061-0

  • Online ISBN: 978-3-642-04062-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics