This is a Demo Server. Data inside this system is only for test purpose.
 

Improving misuse detection with neural networks

dc.contributor.advisorTuğlular, Tuğkanen
dc.contributor.authorDemiray, Sadettin
dc.contributor.authorTuğlular, Tuğkan
dc.date.accessioned2023-11-13T09:33:11Z
dc.date.available2023-11-13T09:33:11Z
dc.date.issued2005en
dc.departmentComputer Engineeringen_US
dc.descriptionThesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2005en
dc.descriptionIncludes bibliographical references (leaves: 68-69)en
dc.descriptionText in English Abstract: Turkish and Englishen
dc.descriptionxi, 92 leavesen
dc.description.abstractMisuse Intrusion Detection Systems are rule-based systems that search attack patterns in the data source. Detection ability of misuse detectors is limited to known attack patterns; hence unknown attacks may be missed. In addition, writing new signatures for novel attacks can be troublesome and time consuming. Similarly behavior based IDSs suffered from high rates of false alarms. Artificial neural networks have generalization ability, thus they can be used with intrusion detection system in order to identify normal and attack packets without the need of writing rules. We proposed to use neural networks with network-based IDS. To achieve this, system was trained and tested with both normal and malicious network packets. Backpropagation and Levenberg-Marquardt algorithms were used to train neural networks. For each of these training algorithms a 3-layer and a 4-layer MLP network sets were generated. In addition, self-organizing maps were used to classify attack instances. DARPA 1999 Intrusion Detection Evaluation dataset was used for training and testing, but lack of enough attack patterns in evaluation dataset made us to create a testbed to obtain sufficient malicious traffic. After training was completed, trained neural networks were tested against training dataset and test dataset, which is not part of the training dataset. Results of the experiments showed that, none of the trained backpropagation networks could identify attacks in training and/or testing data sets. But results of the Levenberg-Marquardt networks were more promising as nine of the trained Levenberg-Marquardt networks could identify attack and normal network packets in training and test datasets.en
dc.identifier.urihttp://standard-demo.gcris.com/handle/123456789/4560
dc.institutionauthorDemiray, Sadettin
dc.language.isoenen_US
dc.oaire.dateofacceptance2005-01-01
dc.oaire.impulse0
dc.oaire.influence2.9837197E-9
dc.oaire.influence_alt0
dc.oaire.is_greentrue
dc.oaire.isindiamondjournalfalse
dc.oaire.keywordsComputer Engineering and Computer Science and Control
dc.oaire.keywordsBilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol
dc.oaire.popularity4.223154E-10
dc.oaire.popularity_alt0.0
dc.oaire.publiclyfundedfalse
dc.publisherIzmir Institute of Technologyen
dc.relation.publicationcategoryTezen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectNeural networken
dc.subjectBack propagation networksen
dc.subject.lccTK5105.59 .D36 2005en
dc.subject.lcshComputer networks--Security measuresen
dc.titleImproving misuse detection with neural networksen_US
dc.typeMaster Thesisen_US
dspace.entity.typePublication
relation.isAuthorOfPublication16066bf2-f189-4d4b-91e8-3fc6cb495163
relation.isAuthorOfPublication.latestForDiscovery16066bf2-f189-4d4b-91e8-3fc6cb495163

Files

Collections