In an effort to determine the applicability of neural networks to the problem of misuse detection
we conducted an analysis the approach utilizing simulated network traffic. The experiment was
designed to determine if indications of attack could be identified from typical network traffic, but
it was not intended to completely resolve the issue of applying neural networks to misuse
detection. The analysis did not address the potential benefit of identifying a priori attacks that
may be possible through the use of neural networks. However, determining if a neural network
was capable of identifying misuse incidents with a reasonable degree of accuracy was considered
to be the first step in applying the technology to this form of intrusion detection.