SciELO - Scientific Electronic Library Online

 
 issue51EditorialObject Classification using Hybrid Holistic Descriptors: Application to Building Detection in Aerial Orthophotos author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Polibits

On-line version ISSN 1870-9044

Polibits  n.51 México Jan./Jun. 2015

https://doi.org/10.17562/PB-51-1 

Detecting Simulated Attacks in Computer Networks Using Resilient Propagation Artificial Neural Networks

 

Mario A. Garcia and Tung Trinh

 

The authors are with Texas A & M University-Corpus Christi, Computer Science, 6300 Ocean Dr., Corpus Christi, TX, USA. (e-mail: mario.garcia@tamucc.edu, tung.trinh@tamucc.edu).

 

Manuscript received on January 15, 2015,
Accepted for publication on May 10, 2015,
Published on June 15, 2015.

 

Abstract

In a large network, it is extremely difficult for an administrator or security personnel to detect which computers are being attacked and from where intrusions come. Intrusion detection systems using neural networks have been deemed a promising solution to detect such attacks. The reason is that neural networks have some advantages such as learning from training and being able to categorize data. Many studies have been done on applying neural networks in intrusion detection systems. This work presents a study of applying resilient propagation neural networks to detect simulated attacks. The approach includes two main components: the Data Preprocessing module and the Neural Network. The Data Preprocessing module performs normalizing data function while the Neural Network processes and categorizes each connection to find out attacks. The results produced by this approach are compared with present approaches.

Key words: Computer security, artificial neural network, resilient propagation.

 

DESCARGAR ARTÍCULO EN FORMATO PDF

 

REFERENCES

[1] M. Baldonado, C.-C.K. Chang, L. Gravano, and A. Paepcke, "The Stanford Digital Library Metadata Architecture," Int. J. Digit. Libr. 1 (1997)108-121        [ Links ]

[2] J. Shum and H. A. Malki, "Network intrusion detection system using neural networks," Fourth International Conference on Natural Computation, vol. 5, p. 242-246, Oct. 2008        [ Links ]

[3] R. Weaver, "Guide to network defense and countermeasures," Jan. 2006.         [ Links ]

[4] D. Jiang, Y. Yang, and M. Xia, "Research on intrusion detection based on an improved SOM neural network," Fifth International Conference on Information Assurance and Security, vol. 1, p. 400-403, Aug. 2009.         [ Links ]

[5] I. Ahmad, A.B. Abdullah and A.S. Alghamdi, "Application of artificial neural network in detection of DOS attacks," 2nd International Conference on Security of Information and Networks, 2009.         [ Links ]

[6] G. Poojitha, K. Naveen kumar and P. JayaramiReddy, "Intrusion detection using artificial neural network," International Conference on Computing Communication and Networking Technologies, p. 1 -7, Jul. 2010.         [ Links ]

[7] N. Bashah, I. B. Shanmugam, and A.M. Ahmed, "Hybrid intelligent intrusion detection system," World Academy of Science, Engineering and Technology, 2005.         [ Links ]

[8] R. Beghdad, "Critical study of neural networks in detecting intrusions," Computers and Security, p. 168-175, Jun. 2008.         [ Links ]

[9] I. Mukhopadhyay, M, Chakraborty, S. Chakrabarti, and T. Chatterjee, "Back propagation neural network approach to intrusion detection system," International Conference on Recent Trends in Information Systems, p. 303-308, Dec. 2011.         [ Links ]

[10] X. Yao, "A network intrusion detection approach combined with genetic algorithm and back propagation neural network," International Conference on E-Heath Networking, Digital Ecosystems and Technologies, p. 402-405, Apr. 2010.         [ Links ]

[11] X. Han, "An improved intrusion detection system based on neural network," International Conference on Intelligent Computing and Intelligent Systems, p. 887-890, Nov. 2009.         [ Links ]

[12] http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

[13] J. Heaton, "Programming neural networks with Encog 3," Oct. 2011.         [ Links ]

[14] J. Heaton, "Introduction to neural networks for C#," 2008.         [ Links ]

[15] A. D. Amastasiadis, G. D. Magoulas, and M. N. Vrahatis,"New globally convergent training scheme based on the resilient propagation algorithm," Neurocomputing, vol. 64, p. 253-270, 2005.         [ Links ]

[16] M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani , "A detailed analysis of the KDD CUP 99 data set," Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on , p. 1,6, 8-10, July 2009        [ Links ]

[17] https://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012#6

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License