[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11596448_25guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Computational intelligence for network intrusion detection: recent contributions

Published: 15 December 2005 Publication History

Abstract

Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the contributions of the recent past. These contributions present the success and potential of computational intelligence in network intrusion detection systems for tasks such as feature selection, signature generation, anomaly detection, classification, and clustering. This paper reviews these contributions categorized in the sub-areas of soft computing, machine learning, artificial immune systems, and agent-based systems.

References

[1]
A. Hofmann, T. Horeis, and B. Sick: Feature Selection for Intrusion Detection: An Evolutionary Wrapper Approach. Proc., International Joint Conference on Neural Networks (IJCNN '04) (2004) 1563-1568.
[2]
A. Siraj, R.B. Vaughn, and S.M. Bridges: Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. Proc. Hawaii International Conference on System Sciences (2004) 902-911.
[3]
A. Valdes: Detecting Novel Scans Through Pattern Anomaly Detection. Proc. DARPA Information Survivability Conference and Exhibition (DICEX '03) (2003) 140-151.
[4]
A.H. Sung and S. Mukkamala: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. Proc. Symposium on Applications and the Internet (SAINT '03) (2003) 209-216.
[5]
D. Dasgupta and F. Gonzalez: An Immunity-based Technique to Characterize Intrusions in Computer Networks. IEEE Transactions on Evolutionary Computing, Vol. 6, No. 3 (2002) 281-291.
[6]
D. Dasgupta and H. Brian: Mobile Security Agents for Network Traffic Analysis. Proc. DARPA Information Survivability Conference and Exhibition (2001) 332-340.
[7]
D. Song, M.I. Haywood, A.N. Zincir-Heywood: Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection. IEEE Transactions on Evolutionary Computation, Vol. 9, No. 3 (2005) 225-239.
[8]
F. Esponda, S. Forrest, and P. Helman: A Formal Framework for Positive and Negative Decision Schemes. IEEE Transactions on Systems, Man, and Cybernetics-Part B (Cybernetics), Vol. 34, No. 1 (2004) 357-373.
[9]
F. Gonzalez, J. Gomez, M. Kaniganti, and D. Dasgupta: An Evolutionary Approach to Generate Anomaly (Attack) Signatures. Proc. IEEE International Workshop on Information Assurance (IWIA '03) (2003) 251-259.
[10]
F. Seredynski: Some Issues in Solving the Anomaly Detection Problem Using the Immunological Approach. Proc. IEEE International Parallel and Distributed Processing Symposium (IPDPS '05) (2005) 188-195.
[11]
G. Florez, S.M. Bridges, and R.B. Vaughn: An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection. Proc. North American Fuzzy Processing Society (2002) 457-462.
[12]
H. Adeli and A. Karim: Wavelets in Intelligent Transportation Systems. John Wiley & Sons UK (2005).
[13]
H. Shah, J. Undercoffer, and A. Joshi: Fuzzy Clustering for Intrusion Detection. Proc. IEEE International Conference on Fuzzy Systems (2003) 1274-1278.
[14]
J. Gomez, F. Gonzalez, and D. Dasgupta: An Immuno-Fuzzy Approach to Intrusion Detection. Proc. IEEE International Conference on Fuzzy Systems (2003) 1219-1224.
[15]
J. Kim and P.J. Bentley: Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator. Proc. Congress on Evolutionary Computing (2001) 1244-1252.
[16]
J. Li and C. Manikopoulos. Early Statistical Anomaly Intrusion Detection of DoS Attacks Using MIB Traffic Parameters. Proc. IEEE International Workshop on Information Assurance (IWIA '03) (2003) 53-59.
[17]
J. Xin, J.E. Dickerson, and J.A. Dickerson. Fuzzy Feature Extraction and Visualization for Intrusion Detection. Proc. IEEE International Conference on Fuzzy Systems (2003) 1249-1254.
[18]
J.M. Shapiro, G.B. Lamont, and G.L. Peterson: An Evolutionary Algorithm to Generate Hyper-Ellipsoid Detectors for Negative Selection. Proc. GECCO '05 (2005) 337-344.
[19]
K. Lee and L. Mikhailov: Intelligent Intrusion Detection System. Proc. IEEE International Conference on Intelligent Systems (2004) 497-502.
[20]
K.P. Anchor, P.D. Williams, G.H. Gunsch, and G.B. Lamont: The Computer Defense Immune System: Current and Future Research in Intrusion Detection. Proc. Congress on Evolutionary Computing (2002) 1027-1032.
[21]
L. Zhou, F. Liu, and J. Wu: Research on Co-operative Computer Network Security Technologies. Proc. IEEE International Conference on Systems, Man, and Cybernetics (2004) 1164-1168.
[22]
M.J. Middlemiss and G. Dick: Weighted Feature Extraction Using a Genetic Algorithm for Intrusion Detection. Proc. Congress on Evolutionary Computing (2003) 1669-1675.
[23]
M.M. Pillai, J.H.P. Eloff, and H.S. Venter: An Approach to Implement an Intrusion Detection System Using Genetic Algorithms. Proc. SAICSIT '04 (2004) 228-235.
[24]
M.V. Mahoney and P.K. Chan: Learning Rules for Anomaly Detection of Hostile Network Traffic. Proc. IEEE International Conference on Data Mining (ICDM '03) (2003) 601-604.
[25]
N. Ye, Y. Zhang, and C.M. Borror: Robustness of the Markov Chain Model for Cyber-Attack Detection. IEEE Transactions on Reliability, Vol. 53, No. 1 (2004) 116-123.
[26]
N.B. Amor, S. Benferhat, and Z. Elouedi: Naïve Bayes vs Decision Trees in Intrusion Detectin Systems. Proc. SAC '04 (2004) 420-424.
[27]
P. Miller and A. Inoue: Collaborative Intrusion Detection System. Proc. North American Fuzzy Information Processing Society (2003) 519-524.
[28]
P.A. Diaz-Gomez and D.F. Hougen: Analysis and Mathematical Justification of a Fitness Function Used in an Intrusion Detection System. Proc. GECCO '05 (2005) 1591-1592.
[29]
Q. Xue, L. Guo, and J. Sun: The Design of a Distributed Network Intrusion Detection System IA-NIDS. Proc. International Conference on Machine Learning and Cybernetics (2003) 2305-2308.
[30]
R.A. Kemmerer and G. Vigna: Intrusion Detection: A Brief History and Overview. IEEE Computer (2002) 27-30.
[31]
R.H. Gong, M. Zulkernine, and P. Abolmaesumi: A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. Proc. International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (2005) 246-253.
[32]
S. Chavan, K. Shah, N. Dave, and S. Mukherjee: Adaptive Neuro-Fuzzy Intrusion Detection Systems. Proc. International Conference on Information Technology: Coding and Computing (ITCC '04) (2004) 70-74.
[33]
S. Cho: Incorporating Soft Computing Techniques into a Probabilistic Intrusion Detection System. IEEE Transactions on Systems, Man, and Cybernetics-Part C (Applications and Reviews), Vol. 32, No. 2 (2002) 154-160.
[34]
S. Makkamala and A.H. Sung: Detecting Denial of Service Attacks Using Support Vector Machines. Proc. IEEE International Conference on Fuzzy Systems (2003) 1231-1236.
[35]
S.T. Sarasamma, Q.A. Zhu, and J. Huff: Hierarchical Kohonen Net for Anomaly Detection in Network Security. IEEE Transactions on Systems, Man, and Cybernetics-Part B (Cybernetics), Vol. 35, No. 2 (2005) 302-312.
[36]
T. Abbes, A. A. Bouhoula, and M. Rusinowitch: Protocol Analysis in Intrusion Detection using Decision Tree. Proc. International Conference on Information Technology, Coding, and Computing (ITCC '04) (2004) 404-408.
[37]
W. Ng, R. Chang, and D. Yeung: Dimensionality Reduction for Denial of Service Detection Problems Using RBFNN Output Sensitivity. Proc. International Conference on Machine Learning and Cybernetics (2003) 1293-1298.
[38]
X. Hang and H. Dai: Applying Both Positive and Negative Selection to Supervised Learning for Anomaly Detection. Proc. GECCO '05 (2005) 345-352.
[39]
X. Zhang and Z. Zhu: Combining the HMM and the Neural Network Models to Recognize Intrusions. Proc. International Conference on Machine Learning and Cybernetics (2004) 956-961.
[40]
Y. Liu, D. Tian, and A. Wang: ANNIDS: Intrusion Detection System Based on Artificial Neural Network. Proc. International Conference on Machine Learning and Cybernetics (2003) 1337-1342.
[41]
Y. Xiaoping and D. Yu: An Auto-Configuration Cooperative Distributed Intrusion Detection System. Proc. World Congress on Intelligent Control and Automation (2004) 279-283.
[42]
Z. Anming and J. Chunfu: Study on the Applications of Hidden Markov Models to Computer Intrusion Detection. Proc. World Congress on Intelligent Control and Automation (2004) 256-260.

Cited By

View all
  • (2008)Detecting attack signatures in the real network traffic with ANNIDAExpert Systems with Applications: An International Journal10.1016/j.eswa.2007.03.01134:4(2326-2333)Online publication date: 1-May-2008
  1. Computational intelligence for network intrusion detection: recent contributions

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CIS'05: Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
    December 2005
    1121 pages
    ISBN:3540308180
    • Editors:
    • Yue Hao,
    • Jiming Liu,
    • Yuping Wang,
    • Yiu-ming Cheung,
    • Hujun Yin

    Sponsors

    • NSF of China: National Natural Science Foundation of China
    • Xidian University
    • HKBU: Hong Kong Baptist University
    • Guangdong University of Technology: Guangdong University of Technology

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 15 December 2005

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2008)Detecting attack signatures in the real network traffic with ANNIDAExpert Systems with Applications: An International Journal10.1016/j.eswa.2007.03.01134:4(2326-2333)Online publication date: 1-May-2008

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media