SlideShare a Scribd company logo
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
ARTIFICIAL NEURAL NETWORK 
FOR MISUSE DETECTION 
by 
MANOJ KUMAR GANTAYAT 
(manoj_gantayat@yahoo.co.in) 
Roll # CS200117145 
Under the Guidance of 
MR. S.K.MEHER
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
INTRODUCTION 
INTRUSION DETECTION SYSTEMS (IDS) 
• Host-based IDS 
• Network-based IDS 
• Vulnerability-assessment IDS 
COMPONENT OF Of IDS 
• An information source that provides a stream of event records 
• An analysis engine that identifies signs of intrusions 
• A response component that gene rates reactions based 
on the outcome of the analysis engine.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
Technical Seminar Presentation - 2004 
NEURAL NETWORKS
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
NEURAL NETWORK IDS PROTOTYPES 
1. Percetron Model: 
A single neuron with adjustable synapses and threshold.
Technical Seminar Presentation - 2004 
2. Backpropagation Model 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
3. Perceptron-Backpropagation Hybrid Model
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
Neural Network Intrusion Detection Systems 
• Computer attack 
• Typical characteristics of User 
• Computer Viruses 
• Malicious Software in Computer Network
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
Technical Seminar Presentation - 2004 
NEGPAIM MODEL
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
NEURAL ENGINE 
• Based Anomaly intrusion detection 
• Establish profiles of normal user and compare user behaviors to 
those profiles 
• Investigation of total behaviors of the user 
Disadvantages 
• A statistical assumption is required
Technical Seminar Presentation - 2004 
IMPLEMENTATION 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
• Uses Multi-layer Pecptron Network 
First Stage : 
1. Training a set of historical Data 
2. Only once for each user 
Second Stage: 
1. Engine accept input Data 
2. Compare with the historical Data
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
IMPLEMENTATION OF ANN 
1. Incorporating into Modified or Existing Expert system 
• The incoming Data is Filtered by Neural Network for suspicious event 
• The False alarm should be reduced 
Disadvantages: 
• Need for update to recognize the new attack
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
2. Neural Network as Stand alone System 
• Data is received from Network Stream and analyzed for 
misuse 
• Indicative of data is forwarded to automated intrusion 
response system
Technical Seminar Presentation - 2004 
LEVEL OF PROCESSING OF DATA 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
LEVEL 1: The element of data is selected from packet as 
Protocol ID, Source Port, Destination Port, Source 
Address, Destination Address, ICMP type, ICMP Code, 
Raw data length, Raw. 
LEVEEL 2: Converting the nine element data to a 
standardized numeric representation. 
LEVEL 3: Conversion of result data into ASCII coma 
delimited format that could be used by Neural Network.
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
ADVANTAGES OF ANN BASED MISUSE 
DETECTION 
• Analyzing the Data which is incomplete of distorted 
• Speed of neural Network 
• A particular event was indicative attack can be known 
• To Learn the characteristics of Misuse attack
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
DISADVANTAGES OF ANN BASED MISUSE 
DETECTION 
• Need accurate training of the system 
• Black Box nature of the neural network 
• The weight and transfer function of various network nodes 
are Frozen after a network has achieved a level of success in 
identification of event
Technical Seminar Presentation - 2004 
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
CONCLUSION 
The early results of tests of these technologies 
show significant promise, and our future work 
will involve the refinement of the approach and 
the development of a full-scale demonstration 
system
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 
Technical Seminar Presentation - 2004 
THANK YOU

More Related Content

PPTX
Artificial neural networks
PPT
Artificial neural network for misuse detection
PPTX
Deep learning approach for network intrusion detection system
PPTX
CIS499_ NKQ_FinalPresentation
PPTX
Application of machine learning and cognitive computing in intrusion detectio...
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PDF
Sensor Organism project presentation
PDF
⭐⭐⭐⭐⭐ #FPGA Based Meteorological Monitoring Station
Artificial neural networks
Artificial neural network for misuse detection
Deep learning approach for network intrusion detection system
CIS499_ NKQ_FinalPresentation
Application of machine learning and cognitive computing in intrusion detectio...
Optimized Intrusion Detection System using Deep Learning Algorithm
Sensor Organism project presentation
⭐⭐⭐⭐⭐ #FPGA Based Meteorological Monitoring Station

What's hot (20)

PDF
A Survey on Data Intrusion schemes used in MANET
PDF
Using Machine Learning in Networks Intrusion Detection Systems
PPTX
Intrusion detection in wireless sensor network
PDF
Wired and Wireless Network Forensics
PDF
Introduction to differential power analysis - Rambus
PPTX
Ids presentation
PDF
Agilent LED Test Solutions
PDF
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
PDF
⭐⭐⭐⭐⭐ Implementation of a Classification System of #EEG Signals Based on #FPGA
PDF
⭐⭐⭐⭐⭐ #BCI System using a Novel Processing Technique Based on Electrodes Sele...
PDF
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
PPTX
Wisenet - Complete ppt about the topic wisenet
PPTX
Cyber Security in Substation Automation (IEC 61850)
PPTX
Network forensic
PPTX
Network packet analysis -capture and Analysis
PPSX
Practical real-time intrusion detection using machine learning approaches
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
PDF
⭐⭐⭐⭐⭐ SSVEP-EEG Signal Classification based on Emotiv EPOC BCI and Raspberry Pi
PPTX
Network scanner
PPTX
Training manual on scada
A Survey on Data Intrusion schemes used in MANET
Using Machine Learning in Networks Intrusion Detection Systems
Intrusion detection in wireless sensor network
Wired and Wireless Network Forensics
Introduction to differential power analysis - Rambus
Ids presentation
Agilent LED Test Solutions
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
⭐⭐⭐⭐⭐ Implementation of a Classification System of #EEG Signals Based on #FPGA
⭐⭐⭐⭐⭐ #BCI System using a Novel Processing Technique Based on Electrodes Sele...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Wisenet - Complete ppt about the topic wisenet
Cyber Security in Substation Automation (IEC 61850)
Network forensic
Network packet analysis -capture and Analysis
Practical real-time intrusion detection using machine learning approaches
Intrusion Detection System using AI and Machine Learning Algorithm
⭐⭐⭐⭐⭐ SSVEP-EEG Signal Classification based on Emotiv EPOC BCI and Raspberry Pi
Network scanner
Training manual on scada
Ad

Viewers also liked (12)

PPTX
Anomaly Detection
PPT
PPTX
Chapter 4 Classification
PDF
Anomaly Detection
PPTX
Anomaly detection, part 1
PPTX
Chapter 10 Anomaly Detection
PPTX
Anomaly Detection
PPT
Chap10 Anomaly Detection
PDF
AUTONOMANIA: Chatbots, AI, self-driving cars and more!
PPTX
bio battery ppt
PPT
Satellite communication
PPTX
A project on wheelchair motion control using eye gaze and blinks
Anomaly Detection
Chapter 4 Classification
Anomaly Detection
Anomaly detection, part 1
Chapter 10 Anomaly Detection
Anomaly Detection
Chap10 Anomaly Detection
AUTONOMANIA: Chatbots, AI, self-driving cars and more!
bio battery ppt
Satellite communication
A project on wheelchair motion control using eye gaze and blinks
Ad

Similar to Artificial neural network for misuse detection (20)

PPTX
Intrusion Detection with Neural Networks
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PDF
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
PDF
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PPTX
network intrusion detection using deep learning
PDF
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
PDF
Application of Machine Learning in Cyber Security
PDF
Intrusion dectection system
PDF
Intrusion detection using generative minority oversampling
PDF
Kx3419591964
PDF
Soft computing and artificial intelligence techniques for intrusion
PDF
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
PPTX
major_project.pptxvvvvvbbjjjjjjjjnjnnjjjjjj
PDF
A Comparative Study of Deep Learning Approaches for Network Intrusion Detecti...
PDF
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
PDF
AI & Machine Learning - Etienne Greeff - SecureData
PDF
PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTIO...
PDF
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
PPTX
Design and Implementation of Intrusion Detection and Prevention by Applying D...
Intrusion Detection with Neural Networks
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
network intrusion detection using deep learning
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Application of Machine Learning in Cyber Security
Intrusion dectection system
Intrusion detection using generative minority oversampling
Kx3419591964
Soft computing and artificial intelligence techniques for intrusion
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
major_project.pptxvvvvvbbjjjjjjjjnjnnjjjjjj
A Comparative Study of Deep Learning Approaches for Network Intrusion Detecti...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
AI & Machine Learning - Etienne Greeff - SecureData
PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTIO...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
Design and Implementation of Intrusion Detection and Prevention by Applying D...

More from Sajan Sahu (20)

PPT
Architecture of message oriented middleware
PPT
Insurance envoy
PPT
Computer’s memory
PPT
Automated inspection of aircraft
PPT
Data compretion
PPS
Deadlock
PPT
Data warehouseing
PPT
Information system
PPT
Dna computing
PPT
Wireless application protocol (WAP)
PPT
Blink detection and tracking of eyes for eye localisat
PPS
Database system
PPT
PPT
PPT
Bluetooth
PPT
802.11
PPT
PPT
Internet telephony
PPT
Wcdma
PPS
Criptography
Architecture of message oriented middleware
Insurance envoy
Computer’s memory
Automated inspection of aircraft
Data compretion
Deadlock
Data warehouseing
Information system
Dna computing
Wireless application protocol (WAP)
Blink detection and tracking of eyes for eye localisat
Database system
Bluetooth
802.11
Internet telephony
Wcdma
Criptography

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
1. Introduction to Computer Programming.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Spectroscopy.pptx food analysis technology
Group 1 Presentation -Planning and Decision Making .pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
cloud_computing_Infrastucture_as_cloud_p
OMC Textile Division Presentation 2021.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Tartificialntelligence_presentation.pptx
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Getting Started with Data Integration: FME Form 101
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
A comparative study of natural language inference in Swahili using monolingua...
TLE Review Electricity (Electricity).pptx
Encapsulation_ Review paper, used for researhc scholars
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
1. Introduction to Computer Programming.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectroscopy.pptx food analysis technology

Artificial neural network for misuse detection

  • 1. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 ARTIFICIAL NEURAL NETWORK FOR MISUSE DETECTION by MANOJ KUMAR GANTAYAT ([email protected]) Roll # CS200117145 Under the Guidance of MR. S.K.MEHER
  • 2. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 INTRODUCTION INTRUSION DETECTION SYSTEMS (IDS) • Host-based IDS • Network-based IDS • Vulnerability-assessment IDS COMPONENT OF Of IDS • An information source that provides a stream of event records • An analysis engine that identifies signs of intrusions • A response component that gene rates reactions based on the outcome of the analysis engine.
  • 3. NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 Technical Seminar Presentation - 2004 NEURAL NETWORKS
  • 4. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 NEURAL NETWORK IDS PROTOTYPES 1. Percetron Model: A single neuron with adjustable synapses and threshold.
  • 5. Technical Seminar Presentation - 2004 2. Backpropagation Model NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 3. Perceptron-Backpropagation Hybrid Model
  • 6. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 Neural Network Intrusion Detection Systems • Computer attack • Typical characteristics of User • Computer Viruses • Malicious Software in Computer Network
  • 7. NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 Technical Seminar Presentation - 2004 NEGPAIM MODEL
  • 8. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 NEURAL ENGINE • Based Anomaly intrusion detection • Establish profiles of normal user and compare user behaviors to those profiles • Investigation of total behaviors of the user Disadvantages • A statistical assumption is required
  • 9. Technical Seminar Presentation - 2004 IMPLEMENTATION NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 • Uses Multi-layer Pecptron Network First Stage : 1. Training a set of historical Data 2. Only once for each user Second Stage: 1. Engine accept input Data 2. Compare with the historical Data
  • 10. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 IMPLEMENTATION OF ANN 1. Incorporating into Modified or Existing Expert system • The incoming Data is Filtered by Neural Network for suspicious event • The False alarm should be reduced Disadvantages: • Need for update to recognize the new attack
  • 11. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 2. Neural Network as Stand alone System • Data is received from Network Stream and analyzed for misuse • Indicative of data is forwarded to automated intrusion response system
  • 12. Technical Seminar Presentation - 2004 LEVEL OF PROCESSING OF DATA NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 LEVEL 1: The element of data is selected from packet as Protocol ID, Source Port, Destination Port, Source Address, Destination Address, ICMP type, ICMP Code, Raw data length, Raw. LEVEEL 2: Converting the nine element data to a standardized numeric representation. LEVEL 3: Conversion of result data into ASCII coma delimited format that could be used by Neural Network.
  • 13. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 ADVANTAGES OF ANN BASED MISUSE DETECTION • Analyzing the Data which is incomplete of distorted • Speed of neural Network • A particular event was indicative attack can be known • To Learn the characteristics of Misuse attack
  • 14. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 DISADVANTAGES OF ANN BASED MISUSE DETECTION • Need accurate training of the system • Black Box nature of the neural network • The weight and transfer function of various network nodes are Frozen after a network has achieved a level of success in identification of event
  • 15. Technical Seminar Presentation - 2004 NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 CONCLUSION The early results of tests of these technologies show significant promise, and our future work will involve the refinement of the approach and the development of a full-scale demonstration system
  • 16. NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS:200118258 Technical Seminar Presentation - 2004 THANK YOU