The Library
An introduction to the use of neural networks for network intrusion detection
Tools
Bitter, Christian, North, John, Elizondo, David A. and Watson, Tim (2012) An introduction to the use of neural networks for network intrusion detection. In: Computational Intelligence for Privacy and Security. Berlin Heidelberg: Springer, pp. 5-24. ISBN 9783642252365
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1007/978-3-642-25237-2_2
Abstract
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situation where a security breach can have an impact on individuals, institutions and critical services, such as power and communication systems. This reliance, along with the possibility of remaining both anonymous and geographically separate from an intrusion, has made cyber-crime an attractive arena for criminals. To protect their assets organisations can use a multi-layered approach to security. As well as the other areas of access control, systems which can detect if malicious or unauthorised activity is occurring are becoming more and more prevalent; intrusion detection systems are at the centre of this. Of particular benefit to intrusion detection systems are any technique with the potential to identify previously unseen patterns, such as neural networks. This chapter is concerned with the state-of-the-art of using neural networks, as part of an intrusion detection system, to identify suspicious or malicious systems traffic. We examine host based systems (where all the information is gathered from a single host) and network based systems. We examine a cross section of different types of neural networks and their application to differing types of intrusion detection.
Item Type: | Book Item | ||||
---|---|---|---|---|---|
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||
Publisher: | Springer | ||||
Place of Publication: | Berlin Heidelberg | ||||
ISBN: | 9783642252365 | ||||
ISSN: | 1860-949X | ||||
Book Title: | Computational Intelligence for Privacy and Security | ||||
Official Date: | 2012 | ||||
Dates: |
|
||||
Volume: | 394 | ||||
Page Range: | pp. 5-24 | ||||
DOI: | 10.1007/978-3-642-25237-2_2 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |