首页> 外文期刊>International Journal of Computer Science and Security >Implementation of Echostate Network in NIDS
【24h】

Implementation of Echostate Network in NIDS

机译:NIDS中回声网络的实现

获取原文
           

摘要

Identifying instances of network attacks by comparing current activity against theexpected actions of an intruder has become an important. Most currentapproaches to misuse detection involve the use of rule-based expert systems toidentify indications of known attacks. Artificial neural networks provide thepotential to identify and classify network activity based on limited, incomplete,and nonlinear data sources. Transmission of data over the internet keeps onincreasing, which needs to protect connected systems also increasing. IntrusionDetection Systems (IDSs) are the latest technology used for this purpose.Although the field of IDSs is still developing, the systems that do exist are still notcomplete, in the sense that they are not able to detect all types of intrusions.Some attacks which are detected by various tools available today cannot bedetected by other products, depending on the types and methods that they arebuilt on. In this work, an artificial neural network using echo state networkalgorithm has been used to implement the IDS. This paper proposes anapproach to implement recurrent echo state network real time IDS. Twenty fourpacket information both normal and intrusion have been considered for training.Testing has been done with new sets of packet information. The result ofintrusion detection (ID) is very close to 90%. The topology of the echo statenetwork is (41 X 20 X 1). The network converged with 24 iterations. However,very huge amount of packets are to be evaluated to know the completeperformance of the developed system.
机译:通过将当前活动与入侵者的预期行为进行比较来识别网络攻击实例已变得很重要。当前大多数的滥用检测方法都涉及使用基于规则的专家系统来识别已知攻击的迹象。人工神经网络提供了基于有限,不完整和非线性数据源识别和分类网络活动的潜力。 Internet上的数据传输不断增长,这对保护连接的系统的需求也在增加。入侵检测系统(IDS)是用于此目的的最新技术。尽管IDS的领域仍在发展中,但从无法检测所有类型的入侵的意义上说,确实存在的系统仍然不完整。可以被当今可用的各种工具检测到,取决于其他产品所基于的类型和方法,其他产品则无法检测到。在这项工作中,使用回波状态网络算法的人工神经网络已被用来实现IDS。本文提出了一种实现递归回波状态网络实时IDS的方法。已经考虑了二十个正常和入侵的四包信息进行训练。已经对新的包信息进行了测试。入侵检测(ID)的结果非常接近90%。回声状态网络的拓扑为(41 X 20 X 1)。网络通过24次迭代收敛。但是,要评估许多数据包才能了解所开发系统的完整性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号