Communications and Network

Volume 2, Issue 1 (February 2010)

ISSN Print: 1949-2421   ISSN Online: 1947-3826

Google-based Impact Factor: 0.63  Citations  

Designing Intrusion Detection System for Web Documents Using Neural Network

HTML  Download Download as PDF (Size: 214KB)  PP. 54-61  
DOI: 10.4236/cn.2010.21008    6,952 Downloads   13,577 Views  Citations

Affiliation(s)

.

ABSTRACT

Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of the organizations are attracted to the intrusion detection systems. The intrusion detection systems can be broadly categorized into two types, Anomaly and Misuse Detection systems. An anomaly-based system detects com-puter intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. Misuse detection systems can detect almost all known attack patterns; they however are hardly of any use to de-tect yet unknown attacks. In this paper, we use Neural Networks for detecting intrusive web documents avail-able on Internet. For this purpose Back Propagation Neural (BPN) Network architecture is applied that is one of the most popular network architectures for supervised learning. Analysis is carried out on Internet Security and Acceleration (ISA) server 2000 log for finding out the web documents that should not be accessed by the unau-thorized persons in an organization. There are lots of web documents available online on Internet that may be harmful for an organization. Most of these documents are blocked for use, but still users of the organization try to access these documents and may cause problem in the organization network.

Share and Cite:

Om, H. and Sarkar, T. (2010) Designing Intrusion Detection System for Web Documents Using Neural Network. Communications and Network, 2, 54-61. doi: 10.4236/cn.2010.21008.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.