A comparative analysis of artificial neural network technologies in intrusion detection systems

Intrusion Detection is a major focus of research in the security of computer systems and networks. This paper presents an analysis of Artificial Neural Networks (ANN) being used in the development of effective Intrusion Detection Systems for computer systems and computer networks. The ANNs technologies, which are discussed, are designed to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources. A review of the foundations of Intrusion Detection Systems and other ANNs, which are the focus of current development efforts, is presented. The results of comparative analysis of different ANNs in Intrusion Detection are discussed. Finally, a discussion of the future ANN technologies, which guarantee to enhance the ability of computer systems to detect intrusions is provided.

[1]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[2]  D. Hammerstrom,et al.  Neural networks at work , 1993, IEEE Spectrum.

[3]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[4]  Limin Fu A neural network model for learning rule-based systems , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.

[5]  James A. Mahaffey,et al.  Multiple Self-Organizing Maps for Intrusion Detection , 2000 .

[6]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[7]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[8]  T.F. Lunt,et al.  Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.

[9]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[10]  Cannady,et al.  Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks , 2000 .

[11]  Paul G. Spirakis,et al.  Intrusion detection: Approach and performance issues of the SECURENET system , 1994, Comput. Secur..