Skip to main content

Pattern Recognition for Intrusion Detection in Computer Networks

  • Chapter
Pattern Recognition and String Matching

Part of the book series: Combinatorial Optimization ((COOP,volume 13))

Abstract

Nowadays an increasing number of commercial and public services are offered through the Internet, so that security is becoming a key issue. The so-called “attacks” on Internet service providers are carried out by exploiting both unknown weaknesses or bugs that are always contained in system and application software, and complex unforeseen interactions between software components and/or network protocols [1], [2]. The objective of computer attacks is to obtain unauthorized access to the information stored in computer systems and/or to cause a temporary unavailability of its services. The so-called “first line” of defence against attacks is made up of a number of access restriction policies that act as a coarse grain filter. Intrusion detection systems (IDSs) are the fine grain filter placed inside the protected network, that look for known or potential threats in network traffic and/or in audit data recorded by hosts [2].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. McHugh, A. Christie, and J. Allen, Defending Yourself: The Role of Intrusion Detection Systems, ( IEEE Software, Sept./Oct. 2000 ) pp. 42–51.

    Google Scholar 

  2. P.E. Proctor, The Practical Intrusion Detection Handbook, (Prentice Hall, 2001 ).

    Google Scholar 

  3. D.E. Denning, An Intrusion-Detection Model, (IEEE Trans. on Software Engineering, SE-13(2), 1987 ) pp. 222–232.

    Google Scholar 

  4. J. McHugh, Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory, (ACM Transactions on Information and System Security, 3 (4), 2000 ) pp. 262–294.

    Google Scholar 

  5. S. Northcutt, M. Cooper, M. Fearnow, K. Frederick, Intrusion Signatures and Analysis, ( New Riders, Indianapolis, 2001 ).

    Google Scholar 

  6. J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, E. Storner, State of the Practice of Intrusion Detection Technologies, (Tech. Rep. CMU/SEI-99-TR-028, 2000 )

    Google Scholar 

  7. R. Duda, P. Hart, D.G. Stork, Pattern Classification, (John Wiley&Sons, 2001 )

    MATH  Google Scholar 

  8. H. Debar, M. Becker, D. Siboni, A Neural Network Component for an Intrusion Detection System, (Proc. of the IEEE Symp. on Research in Security and Privacy, Oakland, CA, USA, 1992 ), pp. 240–250.

    Google Scholar 

  9. J. Ryan, M.J. Lin, R. Miikkulainen, Intrusion Detection with Neural Networks, (in: Advances in Neural Information Processing Systems 10, M. Jordan et al., Eds., Cambridge, MA: MIT Press, 1998 ) pp. 943–949.

    Google Scholar 

  10. J.M. Bonifacio et al., Neural Networks Applied in Intrusion Detection Systems, (Proc. of the IEEE World congress on Comp.Intell. (WCCI ‘88), 1998 ).

    Google Scholar 

  11. A.K. Ghosh and A. Schwartzbard, A Study in Using Neural Networks for Anomaly and Misuse Detection, (Proc. of the USENIX Security Symposium, August 23–26, 1999, Washington, USA).

    Google Scholar 

  12. J. Cannady, An Adaptive Neural Network Approach to Intrusion Detection and Response, (PhD Thesis, School of Comp. and Inf. Sci., Nova Southeastern University, 2000 ).

    Google Scholar 

  13. R.P. Lippmann and R.K. Cunningham, Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks, (Computer Networks, 34, 2000 ) pp. 597–603.

    Article  Google Scholar 

  14. S.C. Lee, D.V. Heinbuch, Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks, (IEEE Trans. on Systems, Man, and Cybernetics, Part A, 31, 2001 ), pp. 294–299.

    Article  Google Scholar 

  15. J. Kittler, M. Hatef, R.P.W. Duin, J. Matas, On Combining Classifiers, (IEEE Trans. on Pattern Analysis and Machine Intelligence, 20 (3), 1998 ), pp. 226–229.

    Article  Google Scholar 

  16. J. Kittler and F. Roli (eds.), Multiple Classifier Systems, (LNCS 2096, Springer, 2001 ).

    MATH  Google Scholar 

  17. C. Elkan, Results of the KDD’99 Classifier Learning, (ACM SIGKDD Explorations, 1, 2000 ), pp. 63–64.

    Google Scholar 

  18. W. Lee and S.J. Stolfo, A Framework for Constructing Features and Models for Intrusion Detection systems, (ACM Trans. on Information and System Security, 3 (4), 2000 ) pp. 227–261.

    Google Scholar 

  19. T. Bass, Intrusion Detection Systems and Multisensor Data Fusion, (Communications of the ACM, 43 (4), 2000 ), pp. 99–105.

    Google Scholar 

  20. S. Axelsson, The Base-Rate Fallacy and the Difficulty of Intrusion Detection, (ACM Trans. on Information and System Security, 3 (3), 2000 ), pp. 186–205.

    MathSciNet  Google Scholar 

  21. L. Xu, A. Krzyzak and C.Y. Suen, Methods for Combining Multiple Classifiers and Their Applications to Handwriting Recognition, (IEEE Trans. Systems, Man and Cybernetics 22, 1992 ) pp. 418–435.

    Article  Google Scholar 

  22. http://www.11.mit.edu/IST/ideval

  23. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  24. F. Rolff, Multisensor Image Recognition by Neural Networks with Understandable Behaviour, (International Journal of Pattern Recognition and Artificial Intelligence, 10, 1996 ) pp. 887–917.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Kluwer Academic Publishers

About this chapter

Cite this chapter

Giacinto, G., Roli, F. (2003). Pattern Recognition for Intrusion Detection in Computer Networks. In: Chen, D., Cheng, X. (eds) Pattern Recognition and String Matching. Combinatorial Optimization, vol 13. Springer, Boston, MA. https://doi.org/10.1007/978-1-4613-0231-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4613-0231-5_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-7952-2

  • Online ISBN: 978-1-4613-0231-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics