Abstract
With the significant increase in use of networks, network security has become more important and challenging. An intrusion detection system plays a major role in providing security. This paper proposes a model in which Artificial Neural Network and Data Mining approaches are used together. In this model “Self Organizing Map” approach is used for behavior learning and “Outlier Mining” approach is used for detecting an intruder. The scope of the proposed model is for internet. This model improves the capability of detecting intruders: both masqueraders and misfeasors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer International Edition (2003)
Bace, R., Mell, P.: NIST Special Publication on Intrusion Detection Systems (2000)
Cannady, J., Harrell, J.: A Comparative Analysis of Current Intrusion Detection Technologies, Georgia Tech Research Institute, http://www.neurosecurity.com/articles/IDS/TISC96.pdf
Hen, J., Kamber, M.: Data Mining- Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)
Seleznyov, A., Puuronen, S.: Anomaly Intrusion Detection Systems- Handling Temporal Relations between Events. University of Jyväskylä, Finland, http://www.raid-symposium.org/raid99/PAPERS/Seleznyov.pdf
Jones, A.K., Sielken, R.S.: Computer system intrusion detection: A survey. Technical report, University of Virginia, Computer Science Department (1999)
Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall, Englewood Cliffs (2003)
Anderson, J.P.: Computer Security- Threat Monitoring and Surveillance. Technical Report, J.P. Anderson Company, Fort Washington, Pennsylvania (1980)
Deepa, S.N., Sivanandam, S.N.: Principles of Soft Computing. Wiley, Chichester (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pareek, V., Mishra, A., Sharma, A., Chauhan, R., Bansal, S. (2010). A Deviation Based Outlier Intrusion Detection System. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)