scispace - formally typeset
Open AccessProceedings ArticleDOI

An overview of neural networks use in anomaly Intrusion Detection Systems

TLDR
This paper presents an overview of neural networks and their use in building anomaly intrusion systems, and the ability of learning has become one of the most promising techniques to solve this problem.
Abstract
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.

read more

Content maybe subject to copyright    Report

An overview of neural networks use in anomaly intrusion detection systems
ABSTRACT
With the increasing number of computers being connected to the Internet, security of an
information system has never been more urgent. Because no system can be absolutely secure,
the timely and accurate detection of intrusions is necessary. This is the reason of an entire
area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect
intrusions by searching for an abnormal system activity. But the main problem of anomaly
detection IDS is that; it is very difficult to build, because of the difficulty in defining what is
normal and what is abnormal. Neural network with its ability of learning has become one of
the most promising techniques to solve this problem. This paper presents an overview of
neural networks and their use in building anomaly intrusion systems.
Keyword: Anomaly detection; Intrusion detection systems; Neural network
Citations
More filters
Journal ArticleDOI

Intrusion detection approach based on optimised artificial neural network

TL;DR: A wide range of ANN setups are put to comparison and the most effective arrangement achieves the multi-class classification accuracy of 99.909% on an established benchmark dataset.
Journal ArticleDOI

An Anomaly Detection Algorithm of Cloud Platform Based on Self-Organizing Maps

TL;DR: A unified modeling method based on SOM to detect the machine performance within the detection region is presented, which avoids the cost of modeling a single virtual machine and enhances the detection speed and reliability of large-scale virtual machines in Cloud platform.
Journal ArticleDOI

Towards a Lightweight Intrusion Detection Framework for In-Vehicle Networks

TL;DR: An efficient model of an Intrusion Detection System (IDS) is developed to detect anomalies in the vehicular system and demonstrates that the proposed model outperforms other classification models.
Proceedings ArticleDOI

Anomaly Detection using Machine Learning Techniques

TL;DR: This paper presents the supervised techniques used to detect the network anomalies and shows how these techniques can be used for fraud detection and monitoring of the machines.
Posted Content

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing

TL;DR: This work focuses on anomaly-based IDSs, showing the main techniques that can be leveraged to detect anomalies and it presents machine learning techniques and their application in the context of an IDS, describing the expected advantages and disadvantages that a specific technique could cause.
References
More filters
Journal ArticleDOI

The self-organizing map

TL;DR: The self-organizing map, an architecture suggested for artificial neural networks, is explained by presenting simulation experiments and practical applications, and an algorithm which order responses spatially is reviewed, focusing on best matching cell selection and adaptation of the weight vectors.
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Proceedings ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Proceedings ArticleDOI

A neural network component for an intrusion detection system

TL;DR: The authors feel the need for alternative techniques and introduce the use of a neural network component for modeling user's behavior as a component for the intrusion detection system, and suggest the time series approach to add broader scope to the model.
Proceedings Article

Intrusion Detection with Neural Networks

TL;DR: A backpropagation neural network called NNID (Neural Network Intrusion Detector) was trained in the identification task and tested experimentally on a system of 10 users, suggesting that learning user profiles is an effective way for detecting intrusions.
Related Papers (5)
Frequently Asked Questions (1)
Q1. What have the authors contributed in "An overview of neural networks use in anomaly intrusion detection systems" ?

This is the reason of an entire area of research, called Intrusion Detection Systems ( IDS ). This paper presents an overview of neural networks and their use in building anomaly intrusion systems. Neural network with its ability of learning has become one of the most promising techniques to solve this problem.