Preview

Artificial Neural Networks for Misuse Detection

Powerful Essays
Open Document
Open Document
5484 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Artificial Neural Networks for Misuse Detection
Abstract:

Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. We present an approach to the process of misuse detection that utilizes the analytical strengths of neural networks, and we provide the results from our preliminary analysis of this approach.
Keywords: Intrusion detection, misuse detection, neural networks, computer security.

1. Introduction
Because of the increasing dependence which companies and government agencies have on their computer networks the importance of protecting these systems from attack is critical. A single intrusion of a computer network can result in the loss or unauthorized utilization or modification of large amounts of data and cause users to question the reliability of all of the information on the network. There are numerous methods of responding to a network intrusion, but they all require the accurate and timely identification of the attack.
This paper presents an analysis of the applicability of neural networks in the identification of instances of external attacks against a network. The results of tests conducted on a neural network, which was designed as a proof-of-concept, are also presented. Finally, the areas of future research that are being conducted in this area are discussed.

1.1 Intrusion Detection Systems

1.1.1 Background
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. The



References: [1] Anderson, D., Frivold, T. & Valdes, A (May, 1995). Next-generation Intrusion Detection Expert System (NIDES): A Summary [2] Carpenter, G.A. & Grossberg, S. (1987). A Massively Parallel Architecture for a Self- Organizing Neural pattern Recognition Machine [3] Chung, M., Puketza, N., Olsson, R.A., & Mukherjee, B. (1995) Simulating Concurrent Intrusions for Testing Intrusion Detection Systems:Parallelizing [4] Cramer, M., et. al. (1995). New Methods of Intrusion Detection using Control-Loop Measurement [5] Debar, H., Becke, M., & Siboni, D. (1992). A Neural Network Component for an Intrusion Detection System [6] Debar, H. & Dorizzi, B. (1992). An Application of a Recurrent Network to an Intrusion Detection System [7] Denault, M., Gritzalis, D., Karagiannis, D., and Spirakis, P. (1994). Intrusion Detection: Approach and Performance Issues of the SECURENET System [9] Fox, Kevin L., Henning, Rhonda R., and Reed, Jonathan H. (1990). A Neural Network Approach Towards Intrusion Detection [10] Frank, Jeremy. (1994). Artificial Intelligence and Intrusion Detection: Current and Future Directions [11] Fu, L. (1992). A Neural Network Model for Learning Rule-Based Systems. In Proceedings of the International Joint Conference on Neural Networks [12] Hammerstrom, Dan. (June, 1993). Neural Networks At Work. IEEE Spectrum. pp. 26- 53. [13] Helman, P., Liepins, G., and Richards, W. (1992). Foundations of Intrusion Detection. In Proceedings of the Fifth Computer Security Foundations Workshop pp [14] Helman, P. and Liepins, G., (1993). Statistical foundations of audit trail analysis for the detection of computer misuse, IEEE Trans [15] Ilgun, K. (1993). USTAT: A Real-time Intrusion Detection System for UNIX. In Proceedings of the IEEE Symposium on Research in Security and Privacy [16] Kohonen, T. (1995) Self-Organizing Maps. Berlin: Springer. [17] Kumar, S. & Spafford, E. (1994) A Pattern Matching Model for Misuse Intrusion Detection [18] Kumar, S. & Spafford, E. (1995) A Software Architecture to Support Misuse Intrusion Detection [19] Lunt, T.F. (1989). Real-Time Intrusion Detection. Computer Security Journal Vol. VI, Number 1 [20] Mukherjee, B., Heberlein, L.T., Levitt, K.N. (May/June, 1994). Network Intrusion Detection [21] Porras, P. & Neumann, P. (1997). EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances [22] Puketza, N., Chung, M., Olsson, R.A. & Mukherjee, B. (September/October, 1997). A Software Platform for Testing Intrusion Detection Systems [23] Ryan, J., Lin, M., and Miikkulainen, R. (1997). Intrusion Detection with Neural Networks. [24] Sebring, M., Shellhouse, E., Hanna, M. & Whitehurst, R. (1988) Expert Systems in Intrusion Detection: A Case Study [25] Staniford-Chen, S. (1995, May 7). Using Thumbprints to Trace Intruders. UC Davis. [26] Tan, K. (1995). The Application of Neural Networks to UNIX Computer Security. In Proceedings of the IEEE International Conference on Neural Networks, Vol.1 pp [27] Tan, K.M.C & Collie, B.S. (1997). Detection and Classification of TCP/IP Network Services [28] White, G.B., Fisch, E.A., and Pooch, U.W. (January/February 1996).Cooperating Security Managers : A Peer-Based Intrusion Detection System

You May Also Find These Documents Helpful

  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Unclassified paper submitted to the faculty of the National Intelligence University in partial fulfillment of the requirements for MCR 601…

    • 2024 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Penetration Test plan

    • 869 Words
    • 4 Pages

    The scope of this Penetration test will include a fully intrusive without compromise attack and penetration test on the e-commerce web-based application server and cisco core backbone network that will be during the hours of 2:00am – 6:00am on Saturday and Sunday only. There will be no compromise on the extraction of information. A compromise can be involved only with Written Client Authorization Only. We will apply a full system backup prior to attack and penetration attack in the event of system malfunction or loss of data. This is subject to change at the Clients’ discretion.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Given the extent of, and the nature of the organisation, the effective operation of the information technology systems is vital to the continuation of business. However, a corporation of 600 staff poses unique security challenges, many of which are satisfied with the implementation of an operational training program completed by all staff.…

    • 4348 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, 19-22 August 2007…

    • 2793 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Artificial Neural Network

    • 5946 Words
    • 24 Pages

    Neural network simulations appear to be a recent development. However, this field was established before the advent of computers, and has survived at least one major setback and several eras.…

    • 5946 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    artificial Neural Networks

    • 6762 Words
    • 28 Pages

    Section 1.3 on the perceptron convergence theorem. This theorem proves convergence of the perceptron as a linearly separable pattern classifier in a finite number…

    • 6762 Words
    • 28 Pages
    Powerful Essays