CFP last date
20 May 2024
Reseach Article

Self Organizing Maps to Build Intrusion Detection System

by Vivek A. Patole, V. K. Pachghare, Parag Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 8
Year of Publication: 2010
Authors: Vivek A. Patole, V. K. Pachghare, Parag Kulkarni
10.5120/191-328

Vivek A. Patole, V. K. Pachghare, Parag Kulkarni . Self Organizing Maps to Build Intrusion Detection System. International Journal of Computer Applications. 1, 8 ( February 2010), 1-4. DOI=10.5120/191-328

@article{ 10.5120/191-328,
author = { Vivek A. Patole, V. K. Pachghare, Parag Kulkarni },
title = { Self Organizing Maps to Build Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 8 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number8/191-328/ },
doi = { 10.5120/191-328 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:45:07.306276+05:30
%A Vivek A. Patole
%A V. K. Pachghare
%A Parag Kulkarni
%T Self Organizing Maps to Build Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 8
%P 1-4
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid expansion of computer usage and computer network the security of the computer system has became very important. Every day new kind of attacks are being faced by industries. Many methods have been proposed for the development of intrusion detection system using artificial intelligence technique. In this paper we will have a look at an algorithm based on neural networks that are suitable for Intrusion Detection Systems (IDS) [1] [2]. The name of this algorithm is “Self Organizing Maps” (SOM). Neural networks method is a promising technique which has been used in many classification problems. The neural network component will implement the neural approach, which is based on the assumption that each user is unique and leaves a unique footprint on a computer system when using it. If a user’s footprint does not match his/her reference footprint based on normal system activities, the system administrator or security officer can be alerted to a possible security breach. At the end of the paper we will figure out the advantages and disadvantages of Self Organizing Maps and explain how it is useful for building an Intrusion Detection System.

References
  1. Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, and Emmanuele Zambon. Poseidon: a 2-tier anomaly-based network intrusion detection system. In Proceedings of the 4th IEEE International Workshop on Information Assurance, 13-14 April 2006, Egham, Surrey, UK, pages 144–156, 2006.
  2. D. A. Frincke, D. Tobin, J. C. McConnell, J. Marconi, and D. Polla. A framework for cooperative intrusion detection. In Proc. 21st NIST-NCSC National Information Systems Security Conference, pages 361–373, 1998.
  3. Denning D, “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, Vol. SE-13, No 2, Feb 1987.
  4. Simon Haykin, “Neural Networks: A Comprehensive Foundation”, Prentice Hall, 2nd edition, 1999.
  5. Kohonen, T, “Self-Organizing Maps”, Springer Series in Information Sciences. Berlin, Heidelberg: Springer. 1997.
  6. P. Lichodzijewski, A. Zincir-Heywood, and M. Heywood. “Dynamic intrusion detection using self organizing maps”, 2002.
  7. McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. on Information and System Security 3 (2000) 262–294.
  8. Wenke Lee and Salvatore J. Stolfo, “A framework for constructing features and models for intrusion detection systems”, ACM Trans. Inf. Syst. Secur., 3(4):227–261, 2000.
  9. Rhodes, B., Mahaffey, J., Cannady, J., “Multiple Self-Organizing Maps for Intrusion Systems”
  10. Bishop, C. M, “Neural Networks for Pattern Recognition”, Oxford: Clarendon-Press, 1996.
  11. Lane, T., and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security 2(3):295—331.
Index Terms

Computer Science
Information Sciences

Keywords

Multimodal interactive kiosk Diabetes Type 2 Telemedicine Human Computer Interaction