The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks | SpringerLink
Skip to main content

The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks

  • Conference paper
  • First Online:
Artificial Neural Networks — ICANN 2001 (ICANN 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2130))

Included in the following conference series:

  • 3469 Accesses

Abstract

The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existing intrusion detection approaches require either manual coding of new attacks in expert systems or the complete retraining of a neural network to improve analysis or learn new attacks. This paper presents a new approach to applying adaptive neural networks to intrusion detection that is capable of autonomously learning new attacks rapidly using feedback from the protected system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Albus, J.S. (1975, September). A New Approach to Control: The Cerebellar Model Articulation Controller (CMAC). Transactions of the ASME.

    Google Scholar 

  • Bonifacio, J.M, Cansian, A.M., de Carvalho, A., & Moreira, E. (1998). Neural Networks Applied in Intrusion Detection. In Proceedings of the International Joint Conference on Neural Networks.

    Google Scholar 

  • Carpenter, G.A., Grossberg, S., Markuzon, N., Reynolds, J.H., and Rosen, D.B. (1992). Fuzzy ARTMAP: A Neural Network Architecture for Incremental Supervised Learning Of Analog Multidimensional Maps, In IEEE Transactions on Neural Networks, 3, 698–713.

    Article  Google Scholar 

  • Cannady, J. (1998). Applying Neural Networks to Misuse Detection. In Proceedings of the 21st National Information Systems Security Conference.

    Google Scholar 

  • Cannady, J. (2000, July). Applying CMAC-based On-line Learning to Intrusion Detection. In Proceedings of the 2000 IEEE/INNS Joint International Conference on Neural Networks.

    Google Scholar 

  • Debar, H. & Dorizzi, B. (1992). An Application of a Recurrent Network to an Intrusion Detection System. In Proceedings of the International Joint Conference on Neural Networks.

    Google Scholar 

  • Fox, Kevin L., Henning, Rhonda R., & Reed, Jonathan H. (1990). A Neural Network Approach Towards Intrusion Detection. In Proceedings of the 13th National Computer Security

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cannady, J., Garcia, R.C. (2001). The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks. In: Dorffner, G., Bischof, H., Hornik, K. (eds) Artificial Neural Networks — ICANN 2001. ICANN 2001. Lecture Notes in Computer Science, vol 2130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44668-0_32

Download citation

  • DOI: https://doi.org/10.1007/3-540-44668-0_32

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42486-4

  • Online ISBN: 978-3-540-44668-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics