A Neural Network Based Anomaly Intrusion Detection System

Security system is the immune system for computers which is similar to the immune system in the human body. This includes all operations required to protect computer and systems from intruders. The aim of this work is to develop an anomaly-based intrusion detection system (IDS) that can promptly detect and classify various attacks. Anomaly-based IDSs need to be able to learn the dynamically changing behavior of users or systems. In this paper, we are experimenting with packet behavior as parameters in anomaly intrusion detection. There are several methods to assist IDSs to learn system's behavior. The proposed IDS uses a back propagation artificial neural network (ANN) to learn system's behavior. We have used the KDD'99 data set in our experiments and the obtained results satisfy the work objective.

[1]  Debra S. Herrmann,et al.  A Practical Guide to Security Engineering and Information Assurance , 2001 .

[2]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..

[3]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[4]  Monis Akhlaq,et al.  Evaluating Intrusion Detection Systems in High Speed Networks , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[5]  Peter Mell,et al.  NIST Special Publication on Intrusion Detection Systems , 2001 .

[6]  Ingoo Han,et al.  The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..

[7]  Mansour Sheikhan,et al.  Fast Neural Intrusion Detection System Based on Hidden Weight Optimization Algorithm and Feature Selection , 2009 .

[8]  Konstantinos Veropoulos,et al.  Medical Decision Making , 2011, Yamada's Textbook of Gastroenterology.

[9]  A. Roli Artificial Neural Networks , 2012, Lecture Notes in Computer Science.

[10]  Martin T. Hagan,et al.  Neural network design , 1995 .

[11]  Peter Mell,et al.  Intrusion Detection Systems , 2001 .

[12]  Ranadhir Ghosh,et al.  A Novel Hybrid Learning Algorithm For Artificial Neural Networks , 2003 .

[13]  Theodoros Lappas,et al.  Data Mining Techniques for ( Network ) Intrusion Detection Systems , 2007 .

[14]  B. Yegnanarayana,et al.  Artificial Neural Networks , 2004 .

[15]  W. Marsden I and J , 2012 .

[16]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[17]  W. Mahoney,et al.  IDEA: A New Intrusion Detection Data Source , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[18]  Alexandr Seleznyov,et al.  An anomaly intrusion detection system based on Intelligent user recognition , 2002 .

[19]  P. Kiran Sree Exploring a Novel Approach for providing Software Security Using Soft Computing Systems , 2008 .

[20]  Philip K. Chan,et al.  PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .