an improved intrusion detection system utilizing a new mix of bp and som neural networks
نویسندگان
چکیده
high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in doing so, we have employed a mix of modified back-propagation (bp) and self-organizing map (som) neural networks that perform pattern recognition and classification in an effective and efficient manner. results indicate that the performance of our proposed ids is significantly improved as compared to the existing systems.
منابع مشابه
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today’s business environment, to help ensure safe and trusted commerce between business partners as well as effective organisational functioning. Various approaches to intrusion detection are currently being utilized, but unfortunately in practice these approaches are relatively ineffective. New ways ...
متن کاملImproved BP Neural Network for Intrusion Detection Based on AFSA
Establishing a complete information security policy is the most important step to solve the problem of information security and the basis for the entire information security system. Using intrusion detection technology to identify the source of threats and adjusting security policy is an effective operation of network protection. Trained BP neural network model is usually adopted as detector, b...
متن کاملInterpretable Neural Networks with BP-SOM
Interpretation of models induced by artiicial neural networks is often a diicult task. In this paper we focus on a relatively novel neural network architecture and learning algorithm, bp-som, that ooers possibilities to overcome this diiculty. It is shown that networks trained with bp-som show interesting regularities, in that hidden-unit activations become restricted to discrete values, and th...
متن کاملA hierarchical SOM-based intrusion detection system
An approach to network intrusion detection is investigated, based purely on a hierarchy of SelfOrganizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. Extensive analysis is conducted in order to address the ...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملSOM-Based Anomaly Intrusion Detection System
In this paper, a SOM-based anomaly intrusion detection system is proposed, which can contract high-dimension data to lower, meanwhile keeping the primary relationship between clustering and topology. During the experiment, the theory of SOM is used to train three SOMs on the layers of system, process and network. Although our experiment environment is simpler than the real one, the result shows...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
the modares journal of electrical engineeringناشر: tarbiat modares university
ISSN 2228-527 X
دوره 7
شماره 1 2008
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023