An overview of neural networks use in anomaly Intrusion Detection Systems
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called In...
Saved in:
| Published in | 2009 IEEE Student Conference on Research and Development pp. 89 - 92 |
|---|---|
| Main Authors | , , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.11.2009
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424451869 1424451868 |
| DOI | 10.1109/SCORED.2009.5443289 |
Cover
| Abstract | With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems. |
|---|---|
| AbstractList | With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems. |
| Author | Azman, Mohamed Ali, Khalid Mohamedou, Ahmed Sani, Yusuf Shamsuddin, Solahuddin Farjamfar, Anahita |
| Author_xml | – sequence: 1 givenname: Yusuf surname: Sani fullname: Sani, Yusuf email: yusifsani@gmail.com organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia – sequence: 2 givenname: Ahmed surname: Mohamedou fullname: Mohamedou, Ahmed email: ahmadmalic18@hotmail.com organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia – sequence: 3 givenname: Khalid surname: Ali fullname: Ali, Khalid email: khalidxayle@hotmail.com organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia – sequence: 4 givenname: Anahita surname: Farjamfar fullname: Farjamfar, Anahita email: anahitafarjamfar@yahoo.com organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia – sequence: 5 givenname: Mohamed surname: Azman fullname: Azman, Mohamed email: azrulazmi@gmail.com organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia – sequence: 6 givenname: Solahuddin surname: Shamsuddin fullname: Shamsuddin, Solahuddin email: solahuddin.shamsuddin@gmail.com organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia |
| BookMark | eNo1UFFrgzAYzNgKm52_oC_5A7rExMQ8Ftt1QqGwbs8l0U_IpnEYbfHfz7Lu7uHu4Pj4uAA9uM4BQitKYkqJejnmh_ftJk4IUXHKOUsydYcCyhPOU5pJcY9CJbP_LNQCBdeuYnzmIwq9_yIzeJooxZ9QsXa4O0N_tnDBXY0djL1uZhkuXf_t8egBW4e161rdTLhwQz962zm8gQHK4eqOkx-g9c9oUevGQ3jTJfp83X7kb9H-sCvy9T6yVKZDBKaWpeCyqgiUVVYJTVmtWCkSyUyaGklrXqnMsEQKBVTwysyvklrK0hBNS7ZEq7-7FgBOP71tdT-dblOwX3JcUvc |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/SCORED.2009.5443289 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1424451876 9781424451876 |
| EndPage | 92 |
| ExternalDocumentID | 5443289 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IG 6IK 6IL 6IM 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-i175t-ebf7c647dd0ecd8d6a13f93c6273b55b71f4d98b32769e164db5290f77cb0a1c3 |
| IEDL.DBID | RIE |
| ISBN | 9781424451869 1424451868 |
| IngestDate | Wed Aug 27 03:11:27 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009934343 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-ebf7c647dd0ecd8d6a13f93c6273b55b71f4d98b32769e164db5290f77cb0a1c3 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_5443289 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-Nov. |
| PublicationDateYYYYMMDD | 2009-11-01 |
| PublicationDate_xml | – month: 11 year: 2009 text: 2009-Nov. |
| PublicationDecade | 2000 |
| PublicationTitle | 2009 IEEE Student Conference on Research and Development |
| PublicationTitleAbbrev | SCORED |
| PublicationYear | 2009 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000452994 |
| Score | 1.5422539 |
| Snippet | With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 89 |
| SubjectTerms | Anomaly Detection Artificial intelligence Artificial neural networks Communications technology Computer networks Intrusion detection Intrusion Detection Systems Monitoring Network servers Neural Network Neural networks Research and development |
| Title | An overview of neural networks use in anomaly Intrusion Detection Systems |
| URI | https://ieeexplore.ieee.org/document/5443289 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ07T8MwEMetthMToBbxlgdG0sa1E8cj6kMtEg8BlbpV8UuqKA5S0wE-PWcnLQIxMCXxEDlnRXfnu__PCF0JqihjrB8ZK-OIWUEiIbkXu8Nw33IP4ffdFvfpZMZu58m8ga53WhhjTGg-M11_G2r5ulAbv1XW86w2SBCaqMmztNJq7fZTPBpceNRfpd1KPAZ-i3Sqn0VNHSKx6D0PHp5Gw4pXWb_2x_kqwb2M99HddmJVV8lrd1PKrvr8xWz878wPUOdbyIcfdy7qEDWMa6PpjcO-cdMXBXBhsUda5iu4hIbwNd6sDV46nLviLV994KnzugxYPjw0ZWjccrjmnHfQbDx6GUyi-kSFaAlhQhkZablKGdc6NkpnOs0JtbBcKQQxMkkkJ5ZpkUna56kwkElpCVaNLedKxjlR9Ai1XOHMMcIQFlqacyMsBH1EQiLNhVKEJpkU8FtnJ6jtzbB4r6AZi9oCp38Pn6G9UKYJIr9z1IIPMxfg7Ut5GZb5CwFgpT0 |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELVKGWAC1CK-8cBI2rhx4nhE_VALbUHQSt2q2LGliuIgNR3g13N20iIQA1McD5FzJ-vufO89I3TDAxlQSlue0sL3qObE44JZsjtMtzSzIvwWbTGO-lN6PwtnFXS75cIopRz4TDXs0PXy00yu7VFZ02q1QYGwg3ZhRMOCrbU9UbHi4NyK_RXsrdAKwW9Encp3XuoOEZ83X9qPz91OoVhZfvjHDSsuwPQO0GiztAJX8tpY56IhP3-pNv537Yeo_k3lw0_bIHWEKsrU0ODOYAvdtG0BnGlsRS2TJTwcJHyF1yuFFwYnJntLlh94YCwzAxyIOyp30C2DS6XzOpr2upN23yvvVPAWkCjknhKayYiyNPWVTOM0SkigwWERpDEiDAUjmqY8FkGLRVxBLZUKsKqvGZPCT4gMjlHVZEadIAyJoQ4SpriGtI8IKKUZl5IEYSw4bOz4FNWsGebvhWzGvLTA2d_T12ivPxkN58PB-OEc7bumjaP8XaAq_KS6hNifiyvn8i_dNKiK |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Student+Conference+on+Research+and+Development&rft.atitle=An+overview+of+neural+networks+use+in+anomaly+Intrusion+Detection+Systems&rft.au=Sani%2C+Yusuf&rft.au=Mohamedou%2C+Ahmed&rft.au=Ali%2C+Khalid&rft.au=Farjamfar%2C+Anahita&rft.date=2009-11-01&rft.pub=IEEE&rft.isbn=9781424451869&rft.spage=89&rft.epage=92&rft_id=info:doi/10.1109%2FSCORED.2009.5443289&rft.externalDocID=5443289 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424451869/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424451869/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424451869/sc.gif&client=summon&freeimage=true |