An overview of neural networks use in anomaly Intrusion Detection Systems

With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called In...

Full description

Saved in:
Bibliographic Details
Published in2009 IEEE Student Conference on Research and Development pp. 89 - 92
Main Authors Sani, Yusuf, Mohamedou, Ahmed, Ali, Khalid, Farjamfar, Anahita, Azman, Mohamed, Shamsuddin, Solahuddin
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2009
Subjects
Online AccessGet full text
ISBN9781424451869
1424451868
DOI10.1109/SCORED.2009.5443289

Cover

Abstract With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.
AbstractList With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.
Author Azman, Mohamed
Ali, Khalid
Mohamedou, Ahmed
Sani, Yusuf
Shamsuddin, Solahuddin
Farjamfar, Anahita
Author_xml – sequence: 1
  givenname: Yusuf
  surname: Sani
  fullname: Sani, Yusuf
  email: yusifsani@gmail.com
  organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia
– sequence: 2
  givenname: Ahmed
  surname: Mohamedou
  fullname: Mohamedou, Ahmed
  email: ahmadmalic18@hotmail.com
  organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia
– sequence: 3
  givenname: Khalid
  surname: Ali
  fullname: Ali, Khalid
  email: khalidxayle@hotmail.com
  organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia
– sequence: 4
  givenname: Anahita
  surname: Farjamfar
  fullname: Farjamfar, Anahita
  email: anahitafarjamfar@yahoo.com
  organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia
– sequence: 5
  givenname: Mohamed
  surname: Azman
  fullname: Azman, Mohamed
  email: azrulazmi@gmail.com
  organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia
– sequence: 6
  givenname: Solahuddin
  surname: Shamsuddin
  fullname: Shamsuddin, Solahuddin
  email: solahuddin.shamsuddin@gmail.com
  organization: Dept. of Commun. Technol. & Networks, Univ. Putra Malaysia, Serdang, Malaysia
BookMark eNo1UFFrgzAYzNgKm52_oC_5A7rExMQ8Ftt1QqGwbs8l0U_IpnEYbfHfz7Lu7uHu4Pj4uAA9uM4BQitKYkqJejnmh_ftJk4IUXHKOUsydYcCyhPOU5pJcY9CJbP_LNQCBdeuYnzmIwq9_yIzeJooxZ9QsXa4O0N_tnDBXY0djL1uZhkuXf_t8egBW4e161rdTLhwQz962zm8gQHK4eqOkx-g9c9oUevGQ3jTJfp83X7kb9H-sCvy9T6yVKZDBKaWpeCyqgiUVVYJTVmtWCkSyUyaGklrXqnMsEQKBVTwysyvklrK0hBNS7ZEq7-7FgBOP71tdT-dblOwX3JcUvc
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SCORED.2009.5443289
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1424451876
9781424451876
EndPage 92
ExternalDocumentID 5443289
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IK
6IL
6IM
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i175t-ebf7c647dd0ecd8d6a13f93c6273b55b71f4d98b32769e164db5290f77cb0a1c3
IEDL.DBID RIE
ISBN 9781424451869
1424451868
IngestDate Wed Aug 27 03:11:27 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009934343
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-ebf7c647dd0ecd8d6a13f93c6273b55b71f4d98b32769e164db5290f77cb0a1c3
PageCount 4
ParticipantIDs ieee_primary_5443289
PublicationCentury 2000
PublicationDate 2009-Nov.
PublicationDateYYYYMMDD 2009-11-01
PublicationDate_xml – month: 11
  year: 2009
  text: 2009-Nov.
PublicationDecade 2000
PublicationTitle 2009 IEEE Student Conference on Research and Development
PublicationTitleAbbrev SCORED
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452994
Score 1.5422539
Snippet With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be...
SourceID ieee
SourceType Publisher
StartPage 89
SubjectTerms Anomaly Detection
Artificial intelligence
Artificial neural networks
Communications technology
Computer networks
Intrusion detection
Intrusion Detection Systems
Monitoring
Network servers
Neural Network
Neural networks
Research and development
Title An overview of neural networks use in anomaly Intrusion Detection Systems
URI https://ieeexplore.ieee.org/document/5443289
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ07T8MwEMetthMToBbxlgdG0sa1E8cj6kMtEg8BlbpV8UuqKA5S0wE-PWcnLQIxMCXxEDlnRXfnu__PCF0JqihjrB8ZK-OIWUEiIbkXu8Nw33IP4ffdFvfpZMZu58m8ga53WhhjTGg-M11_G2r5ulAbv1XW86w2SBCaqMmztNJq7fZTPBpceNRfpd1KPAZ-i3Sqn0VNHSKx6D0PHp5Gw4pXWb_2x_kqwb2M99HddmJVV8lrd1PKrvr8xWz878wPUOdbyIcfdy7qEDWMa6PpjcO-cdMXBXBhsUda5iu4hIbwNd6sDV46nLviLV994KnzugxYPjw0ZWjccrjmnHfQbDx6GUyi-kSFaAlhQhkZablKGdc6NkpnOs0JtbBcKQQxMkkkJ5ZpkUna56kwkElpCVaNLedKxjlR9Ai1XOHMMcIQFlqacyMsBH1EQiLNhVKEJpkU8FtnJ6jtzbB4r6AZi9oCp38Pn6G9UKYJIr9z1IIPMxfg7Ut5GZb5CwFgpT0
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELVKGWAC1CK-8cBI2rhx4nhE_VALbUHQSt2q2LGliuIgNR3g13N20iIQA1McD5FzJ-vufO89I3TDAxlQSlue0sL3qObE44JZsjtMtzSzIvwWbTGO-lN6PwtnFXS75cIopRz4TDXs0PXy00yu7VFZ02q1QYGwg3ZhRMOCrbU9UbHi4NyK_RXsrdAKwW9Encp3XuoOEZ83X9qPz91OoVhZfvjHDSsuwPQO0GiztAJX8tpY56IhP3-pNv537Yeo_k3lw0_bIHWEKsrU0ODOYAvdtG0BnGlsRS2TJTwcJHyF1yuFFwYnJntLlh94YCwzAxyIOyp30C2DS6XzOpr2upN23yvvVPAWkCjknhKayYiyNPWVTOM0SkigwWERpDEiDAUjmqY8FkGLRVxBLZUKsKqvGZPCT4gMjlHVZEadIAyJoQ4SpriGtI8IKKUZl5IEYSw4bOz4FNWsGebvhWzGvLTA2d_T12ivPxkN58PB-OEc7bumjaP8XaAq_KS6hNifiyvn8i_dNKiK
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Student+Conference+on+Research+and+Development&rft.atitle=An+overview+of+neural+networks+use+in+anomaly+Intrusion+Detection+Systems&rft.au=Sani%2C+Yusuf&rft.au=Mohamedou%2C+Ahmed&rft.au=Ali%2C+Khalid&rft.au=Farjamfar%2C+Anahita&rft.date=2009-11-01&rft.pub=IEEE&rft.isbn=9781424451869&rft.spage=89&rft.epage=92&rft_id=info:doi/10.1109%2FSCORED.2009.5443289&rft.externalDocID=5443289
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424451869/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424451869/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424451869/sc.gif&client=summon&freeimage=true