Intrusion Detection Systems Using Adaptive Regression Spines

@inproceedings{Mukkamala2004IntrusionDS,
  title={Intrusion Detection Systems Using Adaptive Regression Spines},
  author={Srinivas Mukkamala and Andrew H. Sung and Ajith Abraham and Vitorino Ramos},
  booktitle={ICEIS},
  year={2004}
}
Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this paper, we report a performance analysis between Multivariate Adaptive Regression Splines (MARS), neural networks and… 
An Efficient Detection Mechanism for Intrusion Detection Systems Using Rule Learning Method
TLDR
In this experiment, Decision trees algorithm is investigated and the soft computing techniques are trained using the Benchmark KDD cup Data set.
Anomaly Intrusion Detection System Using Gaussian Mixture Model
  • M. Bahrololum, M. Khaleghi
  • Computer Science
    2008 Third International Conference on Convergence and Hybrid Information Technology
  • 2008
TLDR
This work proposes an approach of anomaly intrusion detection system by using Gaussian mixture model, which learns patterns of normal and intrusive activities to classify that use a set of Gaussian probability distribution functions.
Fast intrusion detection system based on Flexible Neural Tree
TLDR
Intrusion detection system (IDS) based on Flexible Neural Trees is presented, which is useful in detection of intrusions, but also in monitoring of security issues and the traffic.
Modeling intrusion detection system using hybrid intelligent systems
Hybrid flexible neural‐tree‐based intrusion detection systems
TLDR
This article proposes an IDS model based on a general and enhanced flexible neural tree (FNT) model that allows input variables selection, overlayer connections, and different activation functions for the various nodes involved.
Improving Bee Algorithm Based Feature Selection in Intrusion Detection System Using Membrane Computing
TLDR
This work proposes a new but robust algorithm called membrane algorithm to improve the Bee Algorithm based feature subset selection technique, and finds that Bee Al algorithm-Membrane Computing (BA-MC) approach is a better technique.
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines
TLDR
This paper has proposed a new hybrid technique by utilizing data mining techniques such as fuzzy C means clustering, Fuzzy neural network / Neurofuzzy and radial basis function(RBF) SVM for fortification of the intrusion detection system.
An Adaptive Hybrid Multi-level Intelligent Intrusion Detection System for Network Security
Intrusion Detection System (IDS) plays a vital factor in providing security to the networks through detecting malicious activities. Due to the extensive advancements in the computer networking, IDS
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 46 REFERENCES
Intrusion detection using neural networks and support vector machines
TLDR
Using a set of benchmark data from a KDD (knowledge discovery and data mining) competition designed by DARPA, it is demonstrated that efficient and accurate classifiers can be built to detect intrusions.
Intrusion Detection with Neural Networks
TLDR
A backpropagation neural network called NNID (Neural Network Intrusion Detector) was trained in the identification task and tested experimentally on a system of 10 users, suggesting that learning user profiles is an effective way for detecting intrusions.
An Intrusion-Detection Model
  • D. Denning
  • Computer Science
    IEEE Transactions on Software Engineering
  • 1987
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that
Identifying key features for intrusion detection using neural networks
TLDR
This paper ranks the importance of input features using Neural networks by analyzing the detection accuracy, false positive rate and false negative rate and identifies key intrusion detection features that aid in achieving faster detection and higher accuracy rate.
Artificial Neural Networks for Misuse Detection
TLDR
This work presents an approach to the process of misuse detection that utilizes the analytical strengths of neural networks, and the results from the preliminary analysis of this approach are provided.
A neural network component for an intrusion detection system
TLDR
The authors feel the need for alternative techniques and introduce the use of a neural network component for modeling user's behavior as a component for the intrusion detection system, and suggest the time series approach to add broader scope to the model.
Learning Program Behavior Profiles for Intrusion Detection
TLDR
Three anomaly detection techniques for profiling program behavior that evolve from memorization to generalization are presented, which start from a simple equality matching algorithm for determining anomalous behavior, and evolve to a feed-forward backpropagation neural network for learning program behavior.
An application of a recurrent network to an intrusion detection system
  • Hervé Debar, B. Dorizzi
  • Computer Science
    [Proceedings 1992] IJCNN International Joint Conference on Neural Networks
  • 1992
TLDR
The authors present an application of recurrent neural networks for intrusion detection using a partially recurrent network that acts as a data filter that highlights anomalous or suspicious data according to previously learned patterns.
New Methods of Intrusion Detection using Control-Loop Measurement
TLDR
The need for better intrusion detection methods, the applicability of digital signal processing to real-time network surveillance, the concept of controlloop behavior, and the design of an innovative intrusion detection system employing these are described.
The development and analysis of intrusion detection algorithms
TLDR
Three new low-complexity intrusion detection algorithms tested on sniffing data from 80,000 real Internet sessions are presented, including a neural network based keyword weighting system that substantially improves the performance of a baseline intrusion detection system.
...
1
2
3
4
5
...