Robust Intrusion Detection and Recognition via Sparse Representation

Author(s):  
Di Xu ◽  
Jie Zhu ◽  
Wei Li
Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 529
Author(s):  
Mahdi Rabbani ◽  
Yongli Wang ◽  
Reza Khoshkangini ◽  
Hamed Jelodar ◽  
Ruxin Zhao ◽  
...  

Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified.


2014 ◽  
pp. 118-125
Author(s):  
Vladimir Golovko ◽  
Leanid Vaitsekhovich

Most current Intrusion Detection Systems (IDS) examine all data features to detect intrusion. Also existing intrusion detection approaches have some limitations, namely impossibility to process large number of audit data for real-time operation, low detection and recognition accuracy. To overcome these limitations, we apply modular neural network models to detect and recognize attacks in computer networks. It is based on combination of principal component analysis (PCA) neural networks and multilayer perceptrons (MLP). PCA networks are employed for important data extraction and to reduce high dimensional data vectors. We present two PCA neural networks for feature extraction: linear PCA (LPCA) and nonlinear PCA (NPCA). MLP is employed to detect and recognize attacks using feature-extracted data instead of original data. The proposed approaches are tested using KDD-99 dataset. The experimental results demonstrate that the designed models are promising in terms of accuracy and computational time for real world intrusion detection.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 87816-87826 ◽  
Author(s):  
Jia Jingping ◽  
Chen Kehua ◽  
Chen Jia ◽  
Zhou Dengwen ◽  
Ma Wei

2014 ◽  
pp. 383-390
Author(s):  
Pavel Kachurka ◽  
Vladimir Golovko

Intrusion detection system is one of the essential security tools of modern information systems. Continuous development of new types of attacks re quires the development of intelligent approaches for intrusion detection capable to detect newest attacks. We present recirculation neural network based approach which lets to detect previously unseen attack types in real-time mode and to further correct recognition of this types. In this paper we use recirculation neural networks as an anomaly detector as well as a misuse detector, ensemble of anomaly and misuse detectors, fusion of several detectors for correct detection and recognition of attack types. The experiments held on both KDD’99 data and real network traffic data show promising results.


1978 ◽  
Vol 85 (3) ◽  
pp. 192-206 ◽  
Author(s):  
David M. Green ◽  
Theodore G. Birdsall

Sign in / Sign up

Export Citation Format

Share Document