paperF13_12
5. Conclusion
Research and development of intrusion detection systems has been ongoing since the early
1980s and the challenges faced by designers increase as the targeted systems because more
diverse and complex. Misuse detection is a particularly difficult problem because of the extensive
number of vulnerabilities in computer systems and the creativity of the attackers. Neural
networks provide a number of advantages in the detection of these attacks. The early results of
our tests of these technologies show significant promise, and our future work will involve the
refinement of this approach and the development of a full-scale demonstration system.
6. References
[1] Anderson, D., Frivold, T. & Valdes, A (May, 1995). Next-generation Intrusion Detection
Expert System (NIDES): A Summary. SRI International Technical Report SRI-CSL-95-07.
[2] Carpenter, G.A. & Grossberg, S. (1987). A Massively Parallel Architecture for a Self-
Organizing Neural pattern Recognition Machine. Computer Vision, Graphics and Image
Processing 37, 54-115.
[3] Chung, M., Puketza, N., Olsson, R.A., & Mukherjee, B. (1995) Simulating Concurrent
Intrusions for Testing Intrusion Detection Systems:Parallelizing. In NISSC. pp. 173-183.
[4] Cramer, M., et. al. (1995). New Methods of Intrusion Detection using Control-Loop
Measurement. In Proceedings of the Technology in Information Security Conference (TISC) 95.
pp. 1-10.
[5] Debar, H., Becke, M., & Siboni, D. (1992). A Neural Network Component for an Intrusion
Detection System. In Proceedings of the IEEE Computer Society Symposium on Research in
Security and Privacy.
[6] Debar, H. & Dorizzi, B. (1992). An Application of a Recurrent Network to an Intrusion
Detection System. In Proceedings of the International Joint Conference on Neural Networks.
pp. (II)478-483.
[7] Denault, M., Gritzalis, D., Karagiannis, D., and Spirakis, P. (1994). Intrusion Detection:
Approach and Performance Issues of the SECURENET System. In Computers and Security Vol.
13, No. 6, pp. 495-507
[8] Denning, Dorothy. (February, 1987). An Intrusion-Detection Model. IEEE Transactions on
Software Engineering, Vol. SE-13, No. 2.