Research and Implementation of Intrusion Detection System Based on Artificial Neural Network

Article Preview

Abstract:

Through the research on intrusion detection and artificial neural network, this paper designs an intrusion detection system based on artificial neural network, in detail describes the theory and implementation of all modules, and then carries out test and analysis for it, the results show that it has great advantages in web-based intrusion detection.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 129-131)

Pages:

1421-1425

Citation:

Online since:

August 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Andrew P. Moore, Robert J. Ellison, Rechard C. Linger, Attack Modeling for Information Security and Survivability, Technical Notes, Carnegie Mellon University, March, (2001).

DOI: 10.21236/ada387544

Google Scholar

[2] Debar. H. Dacier and Wespi. A., towards taxonomy of intrusion detection systems [J]. Computer Networks: 2000. 31. 805-822.

DOI: 10.1016/s1389-1286(98)00017-6

Google Scholar

[3] Kayacik HG. On the capability of an SOM based intrusion detection system [A]. Proceedings of IEEE International Conference on Neural Networks [C], New York: IEEE Press, 2003: 1808-1813.

Google Scholar

[4] Varghese G., Suri S. Fast firewall implementations for software and hardware-based routers. In: Proceedings of ICNP 2001 International Conference on Network Protocols, Riverside, California, and November, 2001. 73-80.

DOI: 10.1109/icnp.2001.992904

Google Scholar

[5] Aickelin U, Bentley P, Cayzer S. Danger theory: The link between ais and ids, In Proc of the Second International Conference on Artificial Immune Systems, 2003. 147-155.

DOI: 10.1007/978-3-540-45192-1_15

Google Scholar

[6] D. Moore, GM. Voelker, and S. Svagae, Inferring Internet denial-of-service activity, Proc. USENIX Security Symposium, Washington D. C, Aug2001: 90-92.

Google Scholar