Main Article Content

Yaser AbdulAali Jasim
Cihan University - Erbil
Vol. 7 No. 1 (2018), Articles, pages 49-65
Accepted: Feb 23, 2018


In this paper, some of the methods used in the intrusion detection system were described using the neural network as a tool in intrusion detection system, which became very necessary in computer systems because it provides protection against attacks by hackers that are becoming increasingly destructive to computer systems.The Backpropagation Neural Network was chosen from among the neural networks due to its ability, speed and intelligence to recognize packet patterns captured from the network, providing the ability to detect intrusion of the system. The speed of the network in giving the diagnosis is one of the most important reasons for choosing the neural network. Therefore, many Attacks features have been analyzed of the standard packets that allow traffic through the network as well as the unusual packets, especially on these protocols (TCP, UDP).The results of these analyzes have been used to learn the neural network on the structure and pattern of standard and unusual packets. There are many algorithms for learning the neural network, but the researcher used the Standard Backpropagation Algorithm. Therefore, for increasing the intelligence and speed of the network and its ability to classify, the researcher used the Resilient Backpropagation Algorithm, provided by MATLAB programming language which is smarter and more accurate than the first algorithm.The output of this system can detect the standards packets from the unusual packets and classify them into five types with the efficiency up to 100% of the defined packets. However, the detection of the unknown attacks is not known, and rating score is zero.This paper contains a lot of tables and figures that illustrate the results and analysis of the results. It should be noted that any intrusion detection system must be up-to-date, as there is no effective and successful intrusion detection system without updating its database.


Download data is not yet available.

Article Details


Abdulla, Saman Mirza. (2006), "Misuse Intrusion Detection System Using Neural Network", College of Engineering, Koya University, Iraq.

Abdulqadir, Fadi M, (2006), "Dot Net Networks & TCP/IP Programming", Tariq, Amman, Jordan.

Anastasiadis, Aristoklis D., (2005), "An Efficient Improvement of the Rprop Algorithm", Dept. of Information Systems & Computing, Brunel University, United Kingdom.

Cannady, J., (1998), "Artificial Neural Network for Misuses Detection", School of Computer and Information Science, Nova Southeastern University.

David Wagner, (2002), "Mimicry Attacks on Host Based Intrusion Detection Systems", University of California, USA. -

Jasim, Yaser A, Hasoon, Safwan O, (2013), "Diagnosis Windows Problems Based on Hybrid Intelligence Systems", Journal of Engineering Science & Technology(JESTEC), Vol. 8, Issue 5, Pages 566-578, School of Engineering, Taylor's University, Malaysia.

Jasim, Yaser A, Thabit, Thabit H, (2015) "A Design of Windows 7 Troubleshooting Software Using Hybrid Intelligence Systems", International Journal of Engineering Research & Management Technology, Vol.2, Issue 2, India.

Negnevitsky, Michael, (2011), "Artificial Intelligence: A Guide to Intelligent Systems", 3rd edition, Addison Wesley.

Northcuttt, Stephan, Novak, Judy, (2001), "Network Intrusion Detection _An analyst 's Handbook".

Szepesvari, Csaba, (2009), "Algorithms for Reinforcement Learning", Alberta University, Canada.

Tan, K.M.C., Collie, B.S., (1997), "Detection and Classification of TCP/IP Network Services", In proceeding of the Computer Security Applications Conference, pp. 99-107. -

Thabit, Thabit H., Jasim, Yaser A., (2017), "Applying IT in Accounting, Environment and Computer Science Studies", 1st Edition, Scholars' Press.

Yasen, Khaled N, Jasim, Yaser A, Thabit, Thabit H, (2015), "Benefits of Relay Station to Enhance Network Signal", International Journal of Education and Science Research Review, Vol. 2, Issue 3, India.