ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION

Recent research indicates a lot of attempts to create an intrusion detection system that is capable of learning and recognizing attacks it faces for the first time. Benchmark datasets were created by the MIT Lincoln Lab and by the International Knowledge Discovery and Data Mining group (KDD). A number of competitions were held and many systems developed as a result. The overall preference was given to expert systems that were based on decision making tree algorithms. This paper explores neural networks as means of intrusion detection. After multiple techniques and methodologies are investigated, we show that properly trained neural networks are capable of fast recognition and classification of different attacks at the level superior to previous approaches.

[1]  Ivica Kostanic,et al.  Principles of Neurocomputing for Science and Engineering , 2000 .

[2]  Alex Aussem,et al.  Queueing network modelling with distributed neural networks for service quality estimation in B-ISDN networks , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[3]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[4]  Gürsel Serpen,et al.  Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.

[5]  Robert P. W. Duin,et al.  Novelty Detection Using Self-Organizing Maps , 1997, ICONIP.

[6]  Dit-Yan Yeung,et al.  Parzen-window network intrusion detectors , 2002, Object recognition supported by user interaction for service robots.

[7]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[8]  Ramesh K. Agarwal,et al.  PNrule : A New Framework for Learning Classifier Models in Data Mining ( A Cast-Study in Network Intrusion Detection ) Technical Report , 2004 .

[9]  P LippmannRichard,et al.  Improving intrusion detection performance using keyword selection and neural networks , 2000 .

[10]  A.N. Zincir-Heywood,et al.  On the capability of an SOM based intrusion detection system , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[11]  Yuchun Lee,et al.  Classifiers : adaptive modules in pattern recognition systems , 1989 .

[12]  Dominique Brodbeck,et al.  A Visual Approach for Monitoring Logs , 1998, LISA.

[13]  Bruce G. Batchelor,et al.  Pattern Recognition: Ideas in Practice , 1978 .

[14]  Vipin Kumar,et al.  Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data , 2003, SDM.

[15]  Vincent Kanade,et al.  Clustering Algorithms , 2021, Wireless RF Energy Transfer in the Massive IoT Era.

[16]  Dmitry V. Novikov Neural networks to intrusion detection , 2005 .

[17]  Leon Reznik,et al.  Anomaly Detection Based Intrusion Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[18]  Itzhak Levin,et al.  KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.

[19]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[20]  Stephen Grossberg,et al.  Fuzzy ARTMAP: A neural network architecture for incremental supervised learning of analog multidimensional maps , 1992, IEEE Trans. Neural Networks.

[21]  Charles Elkan,et al.  Results of the KDD'99 classifier learning , 2000, SKDD.

[22]  P. Werbos,et al.  Beyond Regression : "New Tools for Prediction and Analysis in the Behavioral Sciences , 1974 .

[23]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.

[24]  Boleslaw K. Szymanski,et al.  NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .