首页> 外文会议>European Conference on Information Warfare and Security >Scan Detection System Using Artificial Neural Networks
【24h】

Scan Detection System Using Artificial Neural Networks

机译:使用人工神经网络扫描检测系统

获取原文

摘要

With the growth and expansion of the Internet, the world has become smaller. Nowadays, when it comes to communication, we don't usually think about borders or distances, since we can easily communicate with anyone anywhere in the world, using a cheap resource like an Internet connection. Furthermore, with the growing complexity of information technology infrastructures, like clouds, even when external deterrence is granted, no one can completely assure that information is safe and controlled. In parallel with the enormous flexibility and capacity of the internet, it is necessary to recall that the presence of sensitive data roaming, the Internet or traversing obscure technological layers may lead to attacks targeting critical data or vulnerable network devices, which is the essence of information warfare activities. At the moment, with the dissemination of Social Networks, streaming and other popular internet contents, billions of Terabytes of information are transitioned over the internet. This fact allows that malicious activity roams over the internet, hidden in legitimate look alike traffic. Those activities can only be identified by sophisticated Intrusion Detection Systems (IDS). However, and despite their evolution, due to the huge quantity of events they need to look for, IDSs still produce a great number of false positives, leading to a huge efficiency reduction. The main goal of this work is to demonstrate how a modified IDS (Artificial Neural Networks plus Snort) can be used to reduce false positives generation. In order to achieve our goal, it has been developed a Java application, capable of capture network data, which is processed using artificial neural networks and self-learning methods. Those self-learning methods allow the improvement of the neural network false positive generation rate. We set up this prototype, and monitored, for more than 30 days, a general company network serving several employees. During this time, all anomalies were recorded in a MySQL database for posterior analysis. Our detection results were compared with the ones obtained with a default configured Snort. Throughout this paper we present the reasons why we chose not only this subject but also the Neural Networks technology to implement the solution. We also describe the results obtained and how we made it possible to improve the detection of false positives.
机译:随着互联网的增长和扩张,世界变得越来越小。如今,当谈到沟通时,我们通常不会考虑边界或距离,因为我们可以轻松地与世界任何地方的任何人沟通,使用像互联网连接等廉价资源。此外,由于信息技术基础设施的复杂性日益复杂,如云,即使授予外部威慑,也没有人可以完全确保信息是安全和控制的。与互联网的巨大灵活性和容量平行,有必要回顾,存在敏感数据漫游,互联网或遍历模糊的技术层可能导致攻击瞄准关键数据或易受攻击的网络设备,这是信息的本质战争活动。目前,随着社交网络的传播,流传输和其他流行的互联网内容,数十亿个信息的信息通过互联网转换。这个事实允许恶意活动在互联网上漫游,隐藏在合法的外观中。这些活动只能通过复杂的入侵检测系统(ID)来识别。然而,尽管他们所需的巨大事件,但他们需要寻找大量的事件,但IDS仍然产生大量的误报,导致巨大的效率降低。这项工作的主要目标是展示如何使用修改的ID(人工神经网络加怠速)来减少误报的产生。为了实现我们的目标,已经开发了一种Java应用程序,能够使用人工神经网络和自学方法处理网络数据。那些自学习方法允许改善神经网络假阳性产生率。我们设置了这个原型,并监控了30多天,是一家员工的一般公司网络。在此期间,所有异常都记录在MySQL数据库中进行后分析。将我们的检测结果与用默认配置的Snort获得的检测结果进行了比较。在本文中,我们介绍了我们不仅选择这一主题的原因,而且还提出了实现解决方案的神经网络技术。我们还描述了所获得的结果以及我们如何改善误报的检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号