Skip to main content

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6059))

Abstract

The duty of securing networks is very difficult due to their size, complexity, diversity and dynamic situation. Currently applying neural networks in intrusion detection is a robust approach to ensure security in the network system. Further, neural networks are alternatives to other approaches in the area of intrusion detection. The main objective of this research is to present an adaptive, flexible and optimize neural network architecture for intrusion detection system that provides the potential to identify network activity in a robust way. The results of this work give directions to enhance security applications such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), check points and firewalls and further guide to the security implementers.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Artificial Neural Network Approaches to Intrusion Detection: A Review. In: Telecommunications and Informatics book, Included in ISI/SCI Web of Science and Web of Knowledge, Istanbul, Turkey, pp. 200–205. ACM guide, New York (2009)

    Google Scholar 

  2. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Application of Artificial Neural Network in Detection of DOS Attacks. In: Proceedings of the 2nd international Conference on Security of information and Networks, Famagusta, North Cyprus. SIN 2009, pp. 229–234. ACM, New York (2009)

    Chapter  Google Scholar 

  3. Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)

    Article  Google Scholar 

  4. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Comparative Analysis of Intrusion Detection Approaches. In: 12th IEEE International Conference on Computer Modelling and Simulation, Cambridge, UK, pp. 586–591 (2010)

    Google Scholar 

  5. Mehrotra, K., Mohan, C.K., Ranka, S.: Elements of Artificial Neural Networks, pp. 55–65. MIT Press, Cambridge (1997)

    Google Scholar 

  6. Beqiri, E.: Neural Networks for Intrusion Detection Systems. In: Global Security, Safety, and Sustainability book, pp. 156–165. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Application of Artificial Neural Network in Detection of Probing Attacks. In: IEEE Symposium on Industrial Electronics and Applications (ISIEA 2009), Kuala Lumpur, Malaysia, pp. 557–562 (2009)

    Google Scholar 

  8. Ordoñez-Cardenas, E., Romero-Troncoso, R.d.: MLP neural network and on-line backpropagation learning implementation in a low-cost FPGA. In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI, GLSVLSI 2008, Orlando, Florida, USA, May 04 - 06, pp. 333–338. ACM, New York (2008)

    Chapter  Google Scholar 

  9. Ho, T.L.: 3-D inversion of borehole-to-surface electrical data using a back-propagation neural network. Journal of Applied Geophysics 68(4), 489–499 (2009)

    Article  Google Scholar 

  10. Dutta, M., Chatterjee, A., Rakshit, A.: Intelligent phase correction in automatic digital ac bridges by resilient backpropagation neural network. Measurement 39(10), 884–891 (2006)

    Article  Google Scholar 

  11. ChandraShekar, B.H., Shoba, G.: Classification Of Documents Using Kohonen’s Self-Organizing Map. International Journal of Computer Theory and Engineering 1(5), 610–613 (2009)

    Google Scholar 

  12. Amini, M., Jalili, R., Shahriari, H.R.: RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Computers & Security 25(6), 459–468 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmad, I., Abdulah, A.B., Alghamdi, A.S. (2010). Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks. In: Kim, Th., Adeli, H. (eds) Advances in Computer Science and Information Technology. AST ACN 2010 2010. Lecture Notes in Computer Science, vol 6059. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13577-4_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13577-4_53

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13576-7

  • Online ISBN: 978-3-642-13577-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics