Services on Demand
Journal
Article
Indicators
- Cited by SciELO
- Access statistics
Related links
- Similars in SciELO
Share
Polibits
On-line version ISSN 1870-9044
Polibits n.51 México Jan./Jun. 2015
https://doi.org/10.17562/PB-51-1
Detecting Simulated Attacks in Computer Networks Using Resilient Propagation Artificial Neural Networks
Mario A. Garcia and Tung Trinh
The authors are with Texas A & M University-Corpus Christi, Computer Science, 6300 Ocean Dr., Corpus Christi, TX, USA. (e-mail: mario.garcia@tamucc.edu, tung.trinh@tamucc.edu).
Manuscript received on January 15, 2015,
Accepted for publication on May 10, 2015,
Published on June 15, 2015.
Abstract
In a large network, it is extremely difficult for an administrator or security personnel to detect which computers are being attacked and from where intrusions come. Intrusion detection systems using neural networks have been deemed a promising solution to detect such attacks. The reason is that neural networks have some advantages such as learning from training and being able to categorize data. Many studies have been done on applying neural networks in intrusion detection systems. This work presents a study of applying resilient propagation neural networks to detect simulated attacks. The approach includes two main components: the Data Preprocessing module and the Neural Network. The Data Preprocessing module performs normalizing data function while the Neural Network processes and categorizes each connection to find out attacks. The results produced by this approach are compared with present approaches.
Key words: Computer security, artificial neural network, resilient propagation.
DESCARGAR ARTÍCULO EN FORMATO PDF
REFERENCES
[1] M. Baldonado, C.-C.K. Chang, L. Gravano, and A. Paepcke, "The Stanford Digital Library Metadata Architecture," Int. J. Digit. Libr. 1 (1997)108-121 [ Links ]
[2] J. Shum and H. A. Malki, "Network intrusion detection system using neural networks," Fourth International Conference on Natural Computation, vol. 5, p. 242-246, Oct. 2008 [ Links ]
[3] R. Weaver, "Guide to network defense and countermeasures," Jan. 2006. [ Links ]
[4] D. Jiang, Y. Yang, and M. Xia, "Research on intrusion detection based on an improved SOM neural network," Fifth International Conference on Information Assurance and Security, vol. 1, p. 400-403, Aug. 2009. [ Links ]
[5] I. Ahmad, A.B. Abdullah and A.S. Alghamdi, "Application of artificial neural network in detection of DOS attacks," 2nd International Conference on Security of Information and Networks, 2009. [ Links ]
[6] G. Poojitha, K. Naveen kumar and P. JayaramiReddy, "Intrusion detection using artificial neural network," International Conference on Computing Communication and Networking Technologies, p. 1 -7, Jul. 2010. [ Links ]
[7] N. Bashah, I. B. Shanmugam, and A.M. Ahmed, "Hybrid intelligent intrusion detection system," World Academy of Science, Engineering and Technology, 2005. [ Links ]
[8] R. Beghdad, "Critical study of neural networks in detecting intrusions," Computers and Security, p. 168-175, Jun. 2008. [ Links ]
[9] I. Mukhopadhyay, M, Chakraborty, S. Chakrabarti, and T. Chatterjee, "Back propagation neural network approach to intrusion detection system," International Conference on Recent Trends in Information Systems, p. 303-308, Dec. 2011. [ Links ]
[10] X. Yao, "A network intrusion detection approach combined with genetic algorithm and back propagation neural network," International Conference on E-Heath Networking, Digital Ecosystems and Technologies, p. 402-405, Apr. 2010. [ Links ]
[11] X. Han, "An improved intrusion detection system based on neural network," International Conference on Intelligent Computing and Intelligent Systems, p. 887-890, Nov. 2009. [ Links ]
[12] http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
[13] J. Heaton, "Programming neural networks with Encog 3," Oct. 2011. [ Links ]
[14] J. Heaton, "Introduction to neural networks for C#," 2008. [ Links ]
[15] A. D. Amastasiadis, G. D. Magoulas, and M. N. Vrahatis,"New globally convergent training scheme based on the resilient propagation algorithm," Neurocomputing, vol. 64, p. 253-270, 2005. [ Links ]
[16] M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani , "A detailed analysis of the KDD CUP 99 data set," Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on , p. 1,6, 8-10, July 2009 [ Links ]