Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

An introduction to the use of neural networks for network intrusion detection

Tools
- Tools
+ Tools

Bitter, Christian, North, John, Elizondo, David A. and Watson, Tim (2012) An introduction to the use of neural networks for network intrusion detection. In: Computational Intelligence for Privacy and Security. Berlin Heidelberg: Springer, pp. 5-24. ISBN 9783642252365

Research output not available from this repository, contact author.
Official URL: http://dx.doi.org/10.1007/978-3-642-25237-2_2

Request Changes to record.

Abstract

Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situation where a security breach can have an impact on individuals, institutions and critical services, such as power and communication systems. This reliance, along with the possibility of remaining both anonymous and geographically separate from an intrusion, has made cyber-crime an attractive arena for criminals. To protect their assets organisations can use a multi-layered approach to security. As well as the other areas of access control, systems which can detect if malicious or unauthorised activity is occurring are becoming more and more prevalent; intrusion detection systems are at the centre of this. Of particular benefit to intrusion detection systems are any technique with the potential to identify previously unseen patterns, such as neural networks. This chapter is concerned with the state-of-the-art of using neural networks, as part of an intrusion detection system, to identify suspicious or malicious systems traffic. We examine host based systems (where all the information is gathered from a single host) and network based systems. We examine a cross section of different types of neural networks and their application to differing types of intrusion detection.

Item Type: Book Item
Divisions: Faculty of Science > WMG (Formerly the Warwick Manufacturing Group)
Publisher: Springer
Place of Publication: Berlin Heidelberg
ISBN: 9783642252365
ISSN: 1860-949X
Book Title: Computational Intelligence for Privacy and Security
Official Date: 2012
Dates:
DateEvent
2012Published
Volume: 394
Page Range: pp. 5-24
DOI: 10.1007/978-3-642-25237-2_2
Status: Peer Reviewed
Publication Status: Published

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item
twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us