메뉴 건너뛰기




Volumn 27, Issue 3-4, 2008, Pages 84-100

A feasible intrusion detector for recognizing IIS attacks based on neural networks

Author keywords

Back propagation neural network (BPN); Internet information services (IIS); Internet scanner system (ISS); Intrusion detection; Neural network

Indexed keywords

AEROSPACE ENGINEERING; ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; INFORMATION SERVICES; INTERNET; NEURAL NETWORKS; SENSORS; SIGNAL DETECTION; STATISTICS; WEBSITES; WORLD WIDE WEB;

EID: 49849084469     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.04.004     Document Type: Article
Times cited : (15)

References (45)
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transaction Information and System Security 3 (2000) 186-205
    • (2000) ACM Transaction Information and System Security , vol.3 , pp. 186-205
    • Axelsson, S.1
  • 7
    • 49849087234 scopus 로고    scopus 로고
    • Cong B. Implementation of real time intelligent intrusion detection systems. Proceedings of the ISCA 17th international conference computers and their applications; 2002. p. 450-3.
    • Cong B. Implementation of real time intelligent intrusion detection systems. Proceedings of the ISCA 17th international conference computers and their applications; 2002. p. 450-3.
  • 8
    • 0026850007 scopus 로고    scopus 로고
    • Debar Hervé, Becker Monique, Siboni Didier. A neural network component for an intrusion detection. Proceedings of the IEEE computer society symposium detection system; May 1992. p. 240-50.
    • Debar Hervé, Becker Monique, Siboni Didier. A neural network component for an intrusion detection. Proceedings of the IEEE computer society symposium detection system; May 1992. p. 240-50.
  • 9
    • 0033681199 scopus 로고    scopus 로고
    • Fuzzy network profiling for intrusion detection
    • Dickerson J.E., and Dickerson J.A. Fuzzy network profiling for intrusion detection. IEEE Network (2000) 301-306
    • (2000) IEEE Network , pp. 301-306
    • Dickerson, J.E.1    Dickerson, J.A.2
  • 10
    • 0036082886 scopus 로고    scopus 로고
    • Draelos T, Duggan D, Collins M, Wunsch D. Adaptive critic designs for host-based intrusion detection. Proceedings of the 2002 international joint conference on neural networks. IJCNN'02 (Cat. No.02CH37290), vol. 2; 2002. p. 1720-5.
    • Draelos T, Duggan D, Collins M, Wunsch D. Adaptive critic designs for host-based intrusion detection. Proceedings of the 2002 international joint conference on neural networks. IJCNN'02 (Cat. No.02CH37290), vol. 2; 2002. p. 1720-5.
  • 11
    • 0021522087 scopus 로고
    • Generalized means as model of compensative connectives
    • Dyckhoff H., and Pedrycz W. Generalized means as model of compensative connectives. Fuzzy Sets and Systems 14 (1984) 143-154
    • (1984) Fuzzy Sets and Systems , vol.14 , pp. 143-154
    • Dyckhoff, H.1    Pedrycz, W.2
  • 12
    • 27544495468 scopus 로고    scopus 로고
    • Estevez-Tapiador Juan M, Garcia-Teodoro Pedro, Diaz-Verdejo Jesus E. Detection of web-based attacks through markovian protocol parsing. ISCC, 10th IEEE symposium on computers and communications (ISCC'05); 2005. p. 457-62.
    • Estevez-Tapiador Juan M, Garcia-Teodoro Pedro, Diaz-Verdejo Jesus E. Detection of web-based attacks through markovian protocol parsing. ISCC, 10th IEEE symposium on computers and communications (ISCC'05); 2005. p. 457-62.
  • 14
    • 0024984013 scopus 로고    scopus 로고
    • Heberlein L, Dias G, Levitt K, Mukherjee B, Wood J, Wolber D. A network security monitor. Proceedings of the 1990 IEEE symposium on research in security and privacy; May 1990. p. 296-304.
    • Heberlein L, Dias G, Levitt K, Mukherjee B, Wood J, Wolber D. A network security monitor. Proceedings of the 1990 IEEE symposium on research in security and privacy; May 1990. p. 296-304.
  • 15
    • 0029278204 scopus 로고
    • Optimal design of neural networks using the Taguchi method
    • Khaw J.F.C., Lim B.S., and Lim L.E.N. Optimal design of neural networks using the Taguchi method. Neurocomputing 7 3 (April, 1995) 225-245
    • (1995) Neurocomputing , vol.7 , Issue.3 , pp. 225-245
    • Khaw, J.F.C.1    Lim, B.S.2    Lim, L.E.N.3
  • 16
    • 0001127525 scopus 로고    scopus 로고
    • Methodology of preform design considering workability in metal forming by the artificial neural network and Taguchi method
    • Ko D.C., Kim D.H., Kim B.M., and Choi J.C. Methodology of preform design considering workability in metal forming by the artificial neural network and Taguchi method. Journal of Materials Processing Technology 80-81 (August 1, 1998) 487-492
    • (1998) Journal of Materials Processing Technology , vol.80-81 , pp. 487-492
    • Ko, D.C.1    Kim, D.H.2    Kim, B.M.3    Choi, J.C.4
  • 17
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • Kruegel C., Vigna G., and Robertson W. A multi-model approach to the detection of web-based attacks. Computer Networks 48 (2005) 717-738
    • (2005) Computer Networks , vol.48 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 20
    • 33745898601 scopus 로고    scopus 로고
    • Application of fuzzy neural networks to intrusion detection
    • Li Z.T., and Li J.C. Application of fuzzy neural networks to intrusion detection. Mini-Micro Systems 23 10 (2002) 1235-1238
    • (2002) Mini-Micro Systems , vol.23 , Issue.10 , pp. 1235-1238
    • Li, Z.T.1    Li, J.C.2
  • 22
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • Lippmann R.P., and Cunningham R.K. Improving intrusion detection performance using keyword selection and neural networks. Computer Network 34 (2000) 597-603
    • (2000) Computer Network , vol.34 , pp. 597-603
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 24
    • 0036082885 scopus 로고    scopus 로고
    • Liu Z, Florez F, Bridges SM. A comparison of input representations in neural networks: a case study in intrusion detection. Proceedings of the 2002 international joint conference on neural networks (IJCNN'02), vol. 2; 2002. p. 1708-13.
    • Liu Z, Florez F, Bridges SM. A comparison of input representations in neural networks: a case study in intrusion detection. Proceedings of the 2002 international joint conference on neural networks (IJCNN'02), vol. 2; 2002. p. 1708-13.
  • 25
    • 84864228244 scopus 로고    scopus 로고
    • Lunt TF, Tamaru A, Gilham F. IDES: a progress report. Proceedings of the sixth annual computer security applications conference, Tucson, AZ; December 1990. p. 273-85.
    • Lunt TF, Tamaru A, Gilham F. IDES: a progress report. Proceedings of the sixth annual computer security applications conference, Tucson, AZ; December 1990. p. 273-85.
  • 26
    • 49849096201 scopus 로고    scopus 로고
    • MATLAB Quick-Start Guide. Available from: http://web.mit.edu/vchudnov/www/matlab.html.
    • MATLAB Quick-Start Guide. Available from: http://web.mit.edu/vchudnov/www/matlab.html.
  • 27
  • 29
    • 49849094253 scopus 로고    scopus 로고
    • Nessus. Available from: http://www.nessus.org; 2004.
    • Nessus. Available from: http://www.nessus.org; 2004.
  • 32
    • 49849099349 scopus 로고    scopus 로고
    • RFC 2616 Hypertext Transfer Protocol-HTTP/1.1.
    • RFC 2616 Hypertext Transfer Protocol-HTTP/1.1.
  • 35
    • 49849096325 scopus 로고    scopus 로고
    • Snapp SR, Brentano J, Dias GV, Heberlein LT, Ho C, Levitt KN, Mukherjee B. DIDS - motivation, architecture, and an early prototype. Proceedings of the 14th national computer security conference, Baltimore, MD; Oct. 1991. p. 167-76.
    • Snapp SR, Brentano J, Dias GV, Heberlein LT, Ho C, Levitt KN, Mukherjee B. DIDS - motivation, architecture, and an early prototype. Proceedings of the 14th national computer security conference, Baltimore, MD; Oct. 1991. p. 167-76.
  • 36
    • 49849102796 scopus 로고    scopus 로고
    • Snort. Available from: http://www.snort.org/.
    • Snort. Available from: http://www.snort.org/.
  • 38
    • 84943383590 scopus 로고    scopus 로고
    • Sung AH, Mukkamala S. Identifying important features for intrusion detection using support vector machines and neural networks. Proceedings 2003 symposium on applications and the Internet; 2003. p. 209-16.
    • Sung AH, Mukkamala S. Identifying important features for intrusion detection using support vector machines and neural networks. Proceedings 2003 symposium on applications and the Internet; 2003. p. 209-16.
  • 39
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • Verwoerd T., and Hunt R. Intrusion detection techniques and approaches. Computer Communications 25 15 (September 2002) 1356-1365
    • (2002) Computer Communications , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 41
    • 49849097199 scopus 로고    scopus 로고
    • Winpcap. Available from: http://winpcap.polito.it/.
    • Winpcap. Available from: http://winpcap.polito.it/.
  • 42
    • 0036659222 scopus 로고    scopus 로고
    • Internet intrusion detection based on intelligent neural network system
    • Xiao Y., Li T., Wang X., Leng L., Liu F., and Yin P. Internet intrusion detection based on intelligent neural network system. High Technology Letters 12 7 (2002) 45-47
    • (2002) High Technology Letters , vol.12 , Issue.7 , pp. 45-47
    • Xiao, Y.1    Li, T.2    Wang, X.3    Leng, L.4    Liu, F.5    Yin, P.6
  • 43
    • 24744455037 scopus 로고    scopus 로고
    • Yamada Akira, Miyake Yutaka, Takemori Keisuke, Tanaka Toshiaki. Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data. Proceedings of the international conference on information technology: coding and computing (ITCC'05); 2005.
    • Yamada Akira, Miyake Yutaka, Takemori Keisuke, Tanaka Toshiaki. Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data. Proceedings of the international conference on information technology: coding and computing (ITCC'05); 2005.
  • 44
    • 49849105685 scopus 로고    scopus 로고
    • Zhang Jin-Wei. The study and implementation of intrusion detection and security policy management system based on network topology, Master thesis, National Cheng Kung University, Taiwan; July 2007.
    • Zhang Jin-Wei. The study and implementation of intrusion detection and security policy management system based on network topology, Master thesis, National Cheng Kung University, Taiwan; July 2007.
  • 45
    • 0040431304 scopus 로고    scopus 로고
    • Data mining for network intrusion detection: a comparison of alternative methods
    • Zhu D., Premkumar G., Zhang X., and Chu C.H. Data mining for network intrusion detection: a comparison of alternative methods. Decision Sciences Journal 32 4 (2001) 635-660
    • (2001) Decision Sciences Journal , vol.32 , Issue.4 , pp. 635-660
    • Zhu, D.1    Premkumar, G.2    Zhang, X.3    Chu, C.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.