SciELO - Scientific Electronic Library Online

 
 número51EditorialObject Classification using Hybrid Holistic Descriptors: Application to Building Detection in Aerial Orthophotos índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • No hay artículos similaresSimilares en SciELO

Compartir


Polibits

versión On-line ISSN 1870-9044

Polibits  no.51 México ene./jun. 2015

https://doi.org/10.17562/PB-51-1 

Detecting Simulated Attacks in Computer Networks Using Resilient Propagation Artificial Neural Networks

 

Mario A. Garcia and Tung Trinh

 

The authors are with Texas A & M University-Corpus Christi, Computer Science, 6300 Ocean Dr., Corpus Christi, TX, USA. (e-mail: mario.garcia@tamucc.edu, tung.trinh@tamucc.edu).

 

Manuscript received on January 15, 2015,
Accepted for publication on May 10, 2015,
Published on June 15, 2015.

 

Abstract

In a large network, it is extremely difficult for an administrator or security personnel to detect which computers are being attacked and from where intrusions come. Intrusion detection systems using neural networks have been deemed a promising solution to detect such attacks. The reason is that neural networks have some advantages such as learning from training and being able to categorize data. Many studies have been done on applying neural networks in intrusion detection systems. This work presents a study of applying resilient propagation neural networks to detect simulated attacks. The approach includes two main components: the Data Preprocessing module and the Neural Network. The Data Preprocessing module performs normalizing data function while the Neural Network processes and categorizes each connection to find out attacks. The results produced by this approach are compared with present approaches.

Key words: Computer security, artificial neural network, resilient propagation.

 

DESCARGAR ARTÍCULO EN FORMATO PDF

 

REFERENCES

[1] M. Baldonado, C.-C.K. Chang, L. Gravano, and A. Paepcke, "The Stanford Digital Library Metadata Architecture," Int. J. Digit. Libr. 1 (1997)108-121        [ Links ]

[2] J. Shum and H. A. Malki, "Network intrusion detection system using neural networks," Fourth International Conference on Natural Computation, vol. 5, p. 242-246, Oct. 2008        [ Links ]

[3] R. Weaver, "Guide to network defense and countermeasures," Jan. 2006.         [ Links ]

[4] D. Jiang, Y. Yang, and M. Xia, "Research on intrusion detection based on an improved SOM neural network," Fifth International Conference on Information Assurance and Security, vol. 1, p. 400-403, Aug. 2009.         [ Links ]

[5] I. Ahmad, A.B. Abdullah and A.S. Alghamdi, "Application of artificial neural network in detection of DOS attacks," 2nd International Conference on Security of Information and Networks, 2009.         [ Links ]

[6] G. Poojitha, K. Naveen kumar and P. JayaramiReddy, "Intrusion detection using artificial neural network," International Conference on Computing Communication and Networking Technologies, p. 1 -7, Jul. 2010.         [ Links ]

[7] N. Bashah, I. B. Shanmugam, and A.M. Ahmed, "Hybrid intelligent intrusion detection system," World Academy of Science, Engineering and Technology, 2005.         [ Links ]

[8] R. Beghdad, "Critical study of neural networks in detecting intrusions," Computers and Security, p. 168-175, Jun. 2008.         [ Links ]

[9] I. Mukhopadhyay, M, Chakraborty, S. Chakrabarti, and T. Chatterjee, "Back propagation neural network approach to intrusion detection system," International Conference on Recent Trends in Information Systems, p. 303-308, Dec. 2011.         [ Links ]

[10] X. Yao, "A network intrusion detection approach combined with genetic algorithm and back propagation neural network," International Conference on E-Heath Networking, Digital Ecosystems and Technologies, p. 402-405, Apr. 2010.         [ Links ]

[11] X. Han, "An improved intrusion detection system based on neural network," International Conference on Intelligent Computing and Intelligent Systems, p. 887-890, Nov. 2009.         [ Links ]

[12] http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

[13] J. Heaton, "Programming neural networks with Encog 3," Oct. 2011.         [ Links ]

[14] J. Heaton, "Introduction to neural networks for C#," 2008.         [ Links ]

[15] A. D. Amastasiadis, G. D. Magoulas, and M. N. Vrahatis,"New globally convergent training scheme based on the resilient propagation algorithm," Neurocomputing, vol. 64, p. 253-270, 2005.         [ Links ]

[16] M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani , "A detailed analysis of the KDD CUP 99 data set," Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on , p. 1,6, 8-10, July 2009        [ Links ]

[17] https://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012#6

Creative Commons License Todo el contenido de esta revista, excepto dónde está identificado, está bajo una Licencia Creative Commons