Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors

In this article the artificial immune system and neural network techniques for intrusion detection have been addressed. The AIS allows detecting unknown samples of computer attacks. The integration of AIS and neural networks as detectors permits to increase performance of the system security. The detector structure is based on the integration of the different neural networks namely RNN and MLP. The KDD-99 dataset was used for experiments performing. The experimental results show that such intrusion detection system has possibilities for detection and recognition computer attacks.

[1]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[2]  Gerry V. Dozier,et al.  Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers , 2007, Appl. Soft Comput..

[3]  Vladimir A. Golovko,et al.  Joint Conference on Neural Networks , Orlando , Florida , USA , August 12-17 , 2007 Dimensionality Reduction and Attack Recognition using Neural Network Approaches , 2007 .

[4]  Mohammad Saniee Abadeh,et al.  A parallel genetic local search algorithm for intrusion detection in computer networks , 2007, Eng. Appl. Artif. Intell..

[5]  V. Golovko,et al.  Neural Network Ensembles for Intrusion Detection , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[6]  Michael I. Jordan,et al.  Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint , 2001 .

[7]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[8]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[9]  David J. Marchette A Statistical Method for Profiling Network Traffic , 1999, Workshop on Intrusion Detection and Network Monitoring.

[10]  Morton Swimmer Using the danger model of immune systems for distributed defense in modern data networks , 2007, Comput. Networks.

[11]  Rachid Beghdad,et al.  Critical study of neural networks in detecting intrusions , 2008, Comput. Secur..

[12]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .