2009 IEEE Student Conference on Research and Development (SCOReD) 2009
DOI: 10.1109/scored.2009.5443289
|View full text |Cite
|
Sign up to set email alerts
|

An overview of neural networks use in anomaly Intrusion Detection Systems

Abstract: With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…These data can be analyzed using an intelligence model that is used to improve the security of vehicles and improve road safety infrastructure. Yusuf Sani et al [26] presented an overview of a Neural Network in the use of an anomaly intrusion detection system. The paper gives an overall review of how a neural network works and the way it improves the efficiency of detecting anomalies compared to other systems.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…These data can be analyzed using an intelligence model that is used to improve the security of vehicles and improve road safety infrastructure. Yusuf Sani et al [26] presented an overview of a Neural Network in the use of an anomaly intrusion detection system. The paper gives an overall review of how a neural network works and the way it improves the efficiency of detecting anomalies compared to other systems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The detailed information of the various types of neural network models is explained and described in [26].…”
mentioning
confidence: 99%
“…using remotely a cluster of GPUs of a cloud provider) without the need of installing specialized hardware inside the system targeted by the IDS. While CNNs have been extensively applied for attack recognition, they have been hardly used as a means of detecting network anomalies [112]. In theory, it could be possible to train a CNN on data having labels "normal" and "anomaly", however the wide variety of anomalies attacks requires a huge training set that includes all possible anomalies that can be detected by the system.…”
Section: Artificial Neural Networkmentioning
confidence: 99%
“…Self-Organizing Maps (SOM) [11,12], -means [13,14], and expectation maximization [15] are three commonly used clustering algorithms in anomaly detection. The classification-based algorithm mainly includes neural networks [16,17], Bayesian networks [18,19], and support vector machines [20][21][22]. The main drawback of these algorithms is the high training cost and the complexity of the implementation.…”
Section: Introductionmentioning
confidence: 99%