We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages.
- Authors
Abuadlla, Yousef; Kvascev, Goran; Gajin, Slavko; Jovanović, Zoran
- Abstract
Computer systems and networks suffer due to rapid increase of attacks, and in order to keep them safe from malicious activities or policy violations, there is need for effective security monitoring systems, such as Intrusion Detection Systems (IDS). Many researchers concentrate their efforts on this area using different approaches to build reliable intrusion detection systems. Flow-based intrusion detection systems are one of these approaches that rely on aggregated flow statistics of network traffic. Their main advantages are host independence and usability on high speed networks, since the metrics may be collected by network device hardware or standalone probes. In this paper, an intrusion detection system using two neural network stages based on flow-data is proposed for detecting and classifying attacks in network traffic. The first stage detects significant changes in the traffic that could be a potential attack, while the second stage defines if there is a known attack and in that case classifies the type of attack. The first stage is crucial for selecting time windows where attacks, known or unknown, are more probable. Two different neural network structures have been used, multilayer and radial basis function networks, with the objective to compare performance, memory consumption and the time required for network training. The experimental results demonstrate that the designed models are promising in terms of accuracy and computational time, with low probability of false alarms.
- Subjects
INTRUSION detection systems (Computer security); HOST-based intrusion detection systems (Computer security); COMPUTER network security; INTERNET traffic; ARTIFICIAL neural networks
- Publication
Computer Science & Information Systems, 2014, Vol 11, Issue 2, p601
- ISSN
1820-0214
- Publication type
Article
- DOI
10.2298/CSIS130415035A