Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015 (2015), Article ID 343050, 10 pages
http://dx.doi.org/10.1155/2015/343050
Research Article

Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

1College of Information Science and Engineering, Shandong University, Jinan 250100, China
2Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
3National Cybernet Security Ltd., Beijing 100088, China

Received 8 July 2014; Accepted 13 January 2015

Academic Editor: Alessandro Gasparetto

Copyright © 2015 Kang Xie et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: methods, systems and tools,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 303–336, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. I. Corona, G. Giacinto, and F. Roli, “Adversarial attacks against intrusion detection systems: taxonomy, solutions and open issues,” Information Sciences, vol. 239, pp. 201–225, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. Y.-B. Chen, C. Feng, Q. Zhang, and C.-J. Tang, “Integrated artificial immune system for intrusion detection,” Journal on Communications, vol. 33, no. 2, pp. 125–131, 2012. View at Google Scholar · View at Scopus
  4. L. Li, Y. H. Li, D. Y. Fu, and M. Wan, “Intrusion detection model based on hierarchical structure in wireless sensor networks,” in Proceedings of the International Conference on Electrical and Control Engineering (ICECE '10), pp. 2816–2819, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. E. J. Cho, C. S. Hong, S. Lee, and S. Jeon, “A partially distributed intrusion detection system for wireless sensor networks,” Sensors, vol. 13, no. 12, pp. 15863–15879, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. D. Zhang and C. K. Yeo, “Distributed Court System for intrusion detection in mobile ad hoc networks,” Computers and Security, vol. 30, no. 8, pp. 555–570, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. N. A. Alrajeh and J. Lloret, “Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 351047, 6 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. F. Hosseinpour, K. A. Bakar, A. H. Hardoroudi, and A. F. Dareshur, “Design of a new distributed model for intrusion detection system based on artificial immune system,” in Proceedings of the 6th International Conference on Advanced Information Management and Service (IMS '10), pp. 378–383, Seoul, Republic of Korea, December 2010. View at Scopus
  9. K. Bartos, M. Rehak, and M. Svoboda, “Self-organized collaboration of distributed IDS sensors,” in Detection of Intrusions and Malware, and Vulnerability Assess, vol. 7591 of Lecture Notes in Computer Science, pp. 214–231, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  10. K. Xie, Y. Yang, L. Zhang, W. Li, and Y. Xin, “Research of hierarchical intrusion detection model based on discrete cellular neural networks,” Journal of Information and Computational Science, vol. 10, no. 17, pp. 5569–5578, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Hou, Z. Yu, W. Zheng, and X. Zuo, “Research on distributed intrusion detection system based on mobile agent,” Journal of Computers, vol. 7, no. 8, pp. 1919–1926, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. N. El Kadhi, K. Hadjar, and N. El Zant, “A mobile agents and artificial neural networks for intrusion detection,” Journal of Software, vol. 7, no. 1, pp. 156–160, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Uddin, A. A. Rehman, N. Uddin, J. Memon, R. Alsaqour, and S. Kazi, “Signature-based multi-layer distributed intrusion detection system using mobile agents,” International Journal of Network Security, vol. 15, no. 2, pp. 97–105, 2013. View at Google Scholar · View at Scopus
  14. Y. B. Liu, L. Shi, B. Z. Wang, Y. Q. Wu, and P. H. Wang, “An new agent based distributed adaptive intrusion detection system,” Advanced Materials Research, vol. 532-533, pp. 624–629, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. W. Hu, J. Gao, Y. Wang, O. Wu, and S. Maybank, “Online adaboost-based parameterized methods for dynamic distributed network intrusion detection,” IEEE Transactions on Cybernetics, vol. 44, no. 1, pp. 66–82, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Meng and L.-F. Kwok, “Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection,” Journal of Network and Computer Applications, vol. 39, no. 1, pp. 83–92, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. G. Mao, X. Wu, and X. Jiang, “Intrusion detection models based on data mining,” International Journal of Computational Intelligence Systems, vol. 5, no. 1, pp. 30–38, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. T. Pani and F. de Toro, “An additive decision rules classifier for network intrusion detection,” in Advances in Computational Intelligence, vol. 6691 of Lecture Notes in Computer Science, pp. 105–112, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  19. X. Lei and P. Zhou, “An intrusion detection model based on GS-SVM classifier,” Information Technology Journal, vol. 11, no. 7, pp. 794–798, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Mitra, S. Mazumder, T. Sharma, N. Sengupta, and J. Sil, “Dynamic network traffic data classification for intrusion detection using genetic algorithm,” in Swarm, Evolutionary, and Memetic Computing, vol. 7677 of Lecture Notes in Computer Science, pp. 509–518, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  21. K. Sravani and P. Srinivasu, “Comparative study of machine learning algorithm for intrusion detection system,” in Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, vol. 247 of Advances in Intelligent Systems and Computing, pp. 189–196, Springer, Cham, Switzerland, 2014. View at Publisher · View at Google Scholar
  22. A. Yavuz Oruc, “Designing cellular permutation networks through coset decompositions of symmetric groups,” Journal of Parallel and Distributed Computing, vol. 4, no. 4, pp. 404–422, 1987. View at Publisher · View at Google Scholar · View at Scopus
  23. K. Halonen, V. Porra, T. Roska, and L. O. Chua, “Programmable analogue VLSI CNN chip with local digital logic,” International Journal of Circuit Theory and Applications, vol. 20, no. 5, pp. 573–582, 1992. View at Publisher · View at Google Scholar · View at Scopus
  24. R. Caponetto, L. Fortuna, L. Occhipinti, and M. G. Xibilia, “Hyperchaotic dynamic generation via SC-CNNs for secure transmission applications,” in Proceedings of the IEEE International Joint Conference on Neural Networks, vol. 1, pp. 492–496, May 1998. View at Scopus
  25. P. Arena, S. Baglio, L. Fortuna, and S. Graziani, “Analog cellular networks for multisensor fusion and control,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 47, no. 9, pp. 1378–1382, 2000. View at Publisher · View at Google Scholar · View at Scopus
  26. L. O. Chua and L. Yang, “Cellular neural networks: applications,” IEEE Transactions on Circuits and Systems, vol. 35, no. 10, pp. 1273–1290, 1988. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. S. Parmaksizoglu, E. Gunay, and M. Alci, “Determining clonning templates of CNN via moga: edge detection,” in Proceedings of the IEEE 19th Conference on Signal Processing and Communications Applications (SIU '11), pp. 758–761, 2011. View at Publisher · View at Google Scholar
  28. L. Li, G. Ma, and X. Du, “New method of horizon recognition in seismic data,” IEEE Geoscience and Remote Sensing Letters, vol. 9, no. 6, pp. 1066–1068, 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. S. Baglio, S. Graziani, G. Manganaro, and N. Pitrone, “Cellular neural networks: a new paradigm for multisensor data fusion,” in Proceedings of the 8th Mediterranean Electrotechnical Conference (MELECON '06), pp. 509–512, May 1996. View at Scopus
  30. B. Ando, S. Baglio, S. Graziani, and N. Pitrone, “A novel analog modular sensor fusion architecture for developing ‘smart’ structures,” in Proceedings of the IEEE Instrumentation and Measurement Technology Conference (IMTC '97), vol. 2, pp. 1221–1224, Ottawa, Canada, May 1997. View at Publisher · View at Google Scholar
  31. J. Benton Jr. and D. Smith, “Static output feedback stabilization with prescribed degree of stability,” IEEE Transactions on Automatic Control, vol. 43, no. 10, pp. 1493–1496, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  32. J. Xiang, X. Y. Zhang, H. Y. Su, and J. Chu, “Static output feedback stabilization based on structured Lyapunov Matrix,” Control and Decision, vol. 19, no. 9, pp. 978–982, 2004. View at Google Scholar
  33. J. J. Martínez, J. Garrigós, J. Toledo, and J. Manuel Ferrández, “An efficient and expandable hardware implementation of multilayer cellular neural networks,” Neurocomputing, vol. 114, pp. 54–62, 2013. View at Publisher · View at Google Scholar · View at Scopus