• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

An Analysis of Intrusion Pattern Based on Backpropagation Algorithm


Woo Chong-Woo, Kim Sang-Young, Journal of Internet Computing and Services, Vol. 5, No. 5, pp. 93-104, Oct. 2004
Full Text:
Keywords: Intrusion Detection System, Back-propagation, KDD Cup '99

Abstract

The main function of the intrusion Detection System (IDS) usee to be more or less passive detection of the intrusion evidences, but recently it is developed with more diverse types and methodologies. Especially, it is required that the IDS should process large system audit data fast enough. Therefore the data mining or neural net algorithm is being focused on, since they could satisfy those situations. In this study, we first surveyed and analyzed the several recent intrusion trends and types. And then we designed and implemented an IDS using back-propagation algorithm of the neural net, which could provide more effective solution. The distinctive feature of our study could be stated as follows. First, we designed the system that allows both the Anomaly dection and the Misuse detection. Second, we carried out the intrusion analysis experiment by using the reliable KDD Cup ‘99 data, which would provide us similar results compared to the real data. Finally, we designed the system based on the object-oriented concept, which could adapt to the other algorithms easily.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Chong-Woo, W. & Sang-Young, K. (2004). An Analysis of Intrusion Pattern Based on Backpropagation Algorithm. Journal of Internet Computing and Services, 5(5), 93-104.

[IEEE Style]
W. Chong-Woo and K. Sang-Young, "An Analysis of Intrusion Pattern Based on Backpropagation Algorithm," Journal of Internet Computing and Services, vol. 5, no. 5, pp. 93-104, 2004.

[ACM Style]
Woo Chong-Woo and Kim Sang-Young. 2004. An Analysis of Intrusion Pattern Based on Backpropagation Algorithm. Journal of Internet Computing and Services, 5, 5, (2004), 93-104.