2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541)
DOI: 10.1109/ijcnn.2004.1380190
|View full text |Cite
|
Sign up to set email alerts
|

A neural network application for attack detection in computer networks

Abstract: -This work presents a network intrusion detection method, created to identify and classify illegitimate information in TCP/IP packet payload based on the Snort signature set that represents possible attacks to a network. For this development a type of neural network named Hamming Net was used. The choice of this network is based on the interest to investigate its adequacy to classify network events in real-time, due to is capability to learn faster than other neural network models, such as, multilayer perceptr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Many dedicated efforts are made to detect attack or malware in network by combining the ML with Snort signatures [22][23][24][25]. De Lima et al [22] extracted the feature of attack and benign files from the packet flows.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many dedicated efforts are made to detect attack or malware in network by combining the ML with Snort signatures [22][23][24][25]. De Lima et al [22] extracted the feature of attack and benign files from the packet flows.…”
Section: Related Workmentioning
confidence: 99%
“…Based on this fact the neural network is trained to identify new attack, which is implemented on a MLP 256-21-1 network to achieve detection accuracy about 74%. Other research such as [23,24] used neural network (NN) in attack detection and extracted the feature of attack and benign from the packet content. They combined the Hamming Net NN (HNNN) with 46 Snort signatures for training to classify the illegitimate information in TCP/IP packet payload.…”
Section: Related Workmentioning
confidence: 99%
“…Liangboonprakong and Sornil [13] have extracted sequential n-gram pattern features instead of each feature, individually. However, some researchers have used the Snort signatures to detect attack and malware in the network after combining them with ML [19]- [21].…”
Section: Related Workmentioning
confidence: 99%