Abstract
Nowadays, computer network systems play an increasingly important role in our society. They have become the target of a wide array of malicious attacks that can turn into actual intrusions. This is the reason why computer security has become an essential concern for network administrators. Intrusions can wreak havoc on LANs. And the time and cost to repair the damage can grow to extreme proportions. Instead of using passive measures to fix and patch security holes, it is more effective to adopt proactive measures against intrusions. Recently, several IDS have been proposed and they are based on various technologies. However, these techniques, which have been used in many systems, are useful only for detecting the existing patterns of intrusion. It can not detect new patterns of intrusion. Therefore, it is necessary to develop a new technology of IDS that can find new patterns of intrusion. This paper investigates the asymmetric costs of false errors to enhance the detection systems performance. The proposed method utilizes a network model considering the cost ratio of false errors. Compared with false positive, this scheme accomplishes both security and system performance objectives. The results of our empirical experiment show that the network model provides high accuracy in detection. In addition, the simulation results show that effectiveness of probe detection can be enhanced by considering the costs of false errors.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Lee, W., Stolfo, S.J.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 209–220 (1999)
Esaoo, M., Safavi-Naini, R., Balachadran, B.: Case-based reasoning for intrusion detection. In: 12th Annual Computer Security Application Conference, pp. 214–223 (1996)
Denning, D.E.: An intrusion detection model. IEEE Trans. S. E. SE-13(2), 222–232 (1987)
Richards, K.: Network based intrusion detection: a review of technologies. Computer and Security, 671–682 (1999)
Debar, H., Dacier, M.: Towards a taxonomy of intrusion detection systems. Computer Networks, pp. 805–822 (1989)
Debar, H., Becker, M.: A neural network component for an intrusion detection system. In: IEEE Computer Society Symposium Research in Security and Privacy, pp. 240–250 (1992)
Weber, R.: Information Systems Control and Audit. In: IEEE Symposium on Security and Privacy, pp. 120–128 (1999)
Lippmann, R.P.: Improving intrusion detection performance using keyword selection and neural networks. Computer Networks 24, 597–603 (2000)
Jasper, R.J., Huang, M.Y.: A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks 31, 2465–2475 (1999)
Ilgun, K., Kemmerer, R.A.: Ustat: a real time intrusion system for UNIX. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 16–28 (1993)
Hubbards, B., Haley, T., McAuliffe, L., Schaefer, L., Kelem, N., Walcott, D., Feiertag, R., Schaefer, M.: Computer system intrusion detection, 120–128 (1990)
Vaccaro, H.S.: Detection of anomalous computer session activity. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 280–289 (1989)
Helman, P.: Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on software engineering 19, 861–901 (1993)
Lee, S.Y.: Design and analysis of probe detection systems for TCP networks. International Journal of Advanced Computational Intelligence & Intelligent Informatics 8, 369–372 (2004)
Lee, S.Y.: An Adaptive probe detection model using fuzzy cognitive maps, Ph. D. Dissertation, Daejeon University (2003)
Park, S.J.: A Probe Detection Model using the analysis of the Session Patterns on the Internet Service, ph. D. Dissertation, Daejeon University (2003)
Maxion, R.A.: Masquerade detection truncated command lines. In: International Conference on Dependable Systems and Networks, pp. 219–228 (2002)
Joo, D.J.: The Design Analysis of Intrusion Detection Systems using Data Mining, Ph. D. Dissertation, Korea Advanced Institute of Science and Technology (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, SY., Lee, BH., Kim, YD., Shin, DM., Youn, CH. (2006). A Neural Network Model for Detection Systems Based on Data Mining and False Errors. In: Zhou, X., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4097. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11807964_64
Download citation
DOI: https://doi.org/10.1007/11807964_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36850-2
Online ISBN: 978-3-540-36851-9
eBook Packages: Computer ScienceComputer Science (R0)