HostedDB - Dedicated UNIX Servers

paperF13_12 5.  Conclusion Research and development of intrusion detection systems has been ongoing since the early 1980’s and the challenges faced by designers increase as the targeted systems because more diverse and complex.  Misuse detection is a particularly difficult problem because of the extensive number of vulnerabilities in computer systems and the creativity of the attackers.  Neural networks provide a number of advantages in the detection of these attacks.  The early results of our tests of these technologies show significant promise, and our future work will involve the refinement of this approach and the development of a full-scale demonstration system. 6.  References [1]  Anderson, D., Frivold, T. & Valdes, A (May, 1995).  Next-generation Intrusion Detection Expert System (NIDES):  A Summary. SRI International Technical Report SRI-CSL-95-07. [2]  Carpenter, G.A. & Grossberg, S. (1987). A Massively Parallel Architecture for a Self- Organizing Neural pattern Recognition Machine.  Computer Vision, Graphics and Image Processing 37, 54-115. [3]  Chung, M., Puketza, N., Olsson, R.A., & Mukherjee, B.  (1995)   Simulating Concurrent Intrusions for Testing Intrusion Detection Systems:Parallelizing.  In NISSC. pp. 173-183. [4]  Cramer, M., et. al.  (1995).  New Methods of Intrusion Detection using Control-Loop Measurement.  In Proceedings of the Technology in Information Security Conference (TISC) ’95. pp.  1-10. [5]  Debar, H.,  Becke, M., & Siboni, D. (1992). A Neural Network Component for an Intrusion Detection System.  In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. [6]  Debar, H. & Dorizzi, B.  (1992).  An Application of a Recurrent Network to an Intrusion Detection System.  In Proceedings of the International Joint Conference on Neural Networks. pp.  (II)478-483. [7] Denault, M., Gritzalis, D.,  Karagiannis, D., and Spirakis, P. (1994). Intrusion Detection: Approach and Performance Issues of the SECURENET System. In Computers and Security Vol. 13, No. 6, pp. 495-507 [8]  Denning, Dorothy. (February, 1987). An Intrusion-Detection Model. IEEE Transactions on Software Engineering, Vol. SE-13, No. 2.