Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.3.129

Network based Intrusion Detection System using Adaptive Resonance Theory 2  

김진원 (고려대학교 정보보호대학원)
노태우 (고려대학교 정보보호대학원)
문종섭 (고려대학교 정보보호대학원)
고재영 (국가보안기술연구소)
최대식 (국가보안기술연구소)
한광택 (국가보안기술연구소)
Abstract
As internet expands, the possibility of attack through the network is increasing. So we need the technology which can detect the attack to the system or the network spontaneously. The purpose of this paper proposes the system to detect intrusion automatically using the Adaptive Resonance Theory2(ART2) which is one of artificial neural network The parameters of the system was tunned by ART2 algorithm using a lot of normal packets and various attack packets which were intentionally generated by attack tools. The results were compared and analyzed with conventional methods.
Keywords
IDS; ART2; neural network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Harold S.Javitz and Alfonso Valdes, 'The NIDES Statistical Component De-scription and Justification', Annual Report, SRI Interational. 333 Ravenwood Avenue, Menlo Park, CA 94025, March 1994
2 Wenke Lee, 'Data Mining Framework for Const-urctiong System', 1999
3 Wenke Lee, Salvatore J. Stolfo, Philip K Chan, Eleazar Eskin, Matthw Miller, Shlomo Hershkop, Junxin Zhang, 'Real Time Data Mining-based Intrusion De-tection'. IEEE. 2001
4 실시간 네트워크 침입탐지 시스템. 한국정보보호진흥원. 1998
5 이장헌, 김성옥 '신경회로망을 이용한 비정상적인 패킷탐지'. 정보보호학회논문집, 2001
6 D.Anderson. T.Frivoid and A.Valdes. 'Next generation intrusion detection expert system(NIDES)', Technical Report SRI-CLS-95-07. May, 1995
7 James Cannady. 'Artificial Neural Net-works for Misues Detection', 1988
8 유신근, 이남훈, 심영철. '침입탐지시스템 평가방법론', 한국정보처리학회 논문집. 2000
9 Wenke, Lee, Salvatore J. Stolfo. Kui W Mok, 'A Data Minining Framework for Building Intrusion Detection Models', IEEE Symposium on Security and Privacy, 1999
10 신대철, 이보경, 유동영. 김홍근 '네트워크 비정상행위 탐지를 위한 클러스터링 모델', The 13th Workshop on Information Security and Cryp tography(WISC2001). pp. 187-201, Sept 2001
11 Laurence Fausett, 'Fundamentals of Neural Network Architecture, Algohthm, and Applications', Prentice Hall. pp. 218-288, 1994
12 James A. Freeman and David M. Skapura, Neural Networks, Addison Wesley Pub-lishing Company, pp. 291-339, 1991
13 Porras, A. and Neumann, P. G. EMERALD: Event Monitoring Enabling Responce to Anomalous Live Disturbances. In Pro-ceedings of the National Information Systems Security Conference, October 1997
14 G. A. Capenter, and S. Grossberg 'ART 2 : Self-Organizing of stable category recognition codes for analog input pattems', Applied Optics. Vol.26, pp. 4919-4930, December 1987   DOI
15 http://www.syssim.ecs.soton.ac.uk/vhdlams/examp1es/art2/art2.htm
16 Gail A. Carpenter and Stephen Grossberg. 'A Massively Parallel Architecture for a Self-Organizing Neural Networks', IEEE Computers, pp. 77-88, March 1998
17 Filippidis, A.. L. C. Jain, and P. Lozo. 'Degree of Familiarity ART2 in Knowleged-Based Landmine Detection,' IEEE Tran-sactions on Neural Networks, January 1999, Vol. 10. No. 1, pp. 186-193   DOI   ScienceOn
18 Jake Ryan, Meng-Jang Lin. Risto Miik-kulainen, 'Intrusion Detection with Neural Networks'. in Advanced in Neural Infor-mation Processing System 10, Cambridge MA : MIT process, 1998
19 P. G. Neumann and P. A. Porras, 'Experience with emerald to date', 1st USENIX Workshop on IDS, Santa Clara, pp. 11-12, April 1999
20 멀티 호스트 기반 침입탐지 시스템 개발, 한국정보보호진흥원. 1998