Back propagation neural network approach to Intrusion Detection System

As the Internet is growing - so is the vulnerability of the network. Companies now days are spending huge amount of money to protect their sensitive data from different attacks that they face. In this paper, we propose a new methodology towards developing an Intrusion Detection System (IDS) based on Back-Propagation Neural Network (BPN) model. The proposed system was simulated using Matlab2010a utilizing benchmark intrusion KDDCUP'99 dataset to verify its feasibility and effectiveness.

[1]  Ray-I Chang,et al.  INTRUSION DETECTION BY BACKPROPAGATION NEURAL NETWORKS WITH SAMPLE-QUERY AND ATTRIBUTE-QUERY , 2007 .

[2]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[4]  I. Mukhopadhyay,et al.  HawkEye solutions: a network intrusion detection system , 2011, ICWET.

[5]  Li Jun,et al.  HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .

[6]  Hervé Debar,et al.  An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.

[7]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[8]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[9]  Mehdi MORADI,et al.  A Neural Network Based System for Intrusion Detection and Classification of Attacks , 2004 .

[10]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[11]  Don Holden A Rule-based Intrusion Detection System , 1992, SEC.

[12]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.

[13]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.