Abstract

Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of the organizations are attracted to the intrusion detection systems. The intrusion detection systems can be broadly categorized into two types, Anomaly and Misuse Detection systems. An anomaly-based system detects com-puter intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. Misuse detection systems can detect almost all known attack patterns; they however are hardly of any use to de-tect yet unknown attacks. In this paper, we use Neural Networks for detecting intrusive web documents avail-able on Internet. For this purpose Back Propagation Neural (BPN) Network architecture is applied that is one of the most popular network architectures for supervised learning. Analysis is carried out on Internet Security and Acceleration (ISA) server 2000 log for finding out the web documents that should not be accessed by the unau-thorized persons in an organization. There are lots of web documents available online on Internet that may be harmful for an organization. Most of these documents are blocked for use, but still users of the organization try to access these documents and may cause problem in the organization network.

Highlights

  • The information is the most important resource that must be managed efficiently

  • The basic assumption in the rule-based intrusion detection systems is that the intrusion attempts can be characterized by sequences of user activities that lead to compromised system states and based on that they predict intrusion

  • Though this method is not designed to be used as a complete intrusion detection system, yet the results show the (a) potential of neural networks to detect individual instances of possible misuse from a representative webbased data

Read more

Summary

Introduction

The information is the most important resource that must be managed efficiently. Besides management, its protection is very important as it may lead to economic losses in today’s electronic environment. In USA, if a customer disputes a transaction, this is the responsibility of the bank to prove that the customer is mistaken or lying. This forced the US banks to protect their systems properly. A different kind of incentive failure was seen in early 2000 with distributed denial of service attacks against a number of high profile websites. Those attacks exploited a number of weak machines to launch a large coordinated packet flood at a host.

Early Intrusion Detection System
Rule Based Intrusion Detection Systems
Network-Based and Host-Based Intrusion Detection Systems
Neural Network Based Intrusion Detection Systems
Audit Logs Analysis Using Neural Networks
ISA 2000 Web Access Log Analysis
ISA Server 2000 Web Access Log
Experiment
Results
Discussions
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call