Using Multilayer Perceptron in Computer Security to Improve Intrusion Detection

作者: Flora Amato , Giovanni Cozzolino , Antonino Mazzeo , Emilio Vivenzio

DOI: 10.1007/978-3-319-59480-4_22

关键词: HackerProperty (programming)Network securityArtificial neural networkFalse positive paradoxMultilayer perceptronArtificial intelligenceMachine learningGeneralizationIntrusion detection systemComputer science

摘要: Nowadays computer and network security has become a major cause of concern for experts community, due to the growing number devices connected network. For this reason, optimizing performance systems able detect intrusions (IDS - Intrusion Detection System) is goal common interest. This paper presents methodology classify hacking attacks taking advantage generalization property neural networks. In particular, in work we adopt multilayer perceptron (MLP) model with back-propagation algorithm sigmoidal activation function. We analyse results obtained using different configurations network, varying hidden layers training epochs order obtain low false positives. The will be presented terms type show that best classification carried out DOS Probe attacks.

参考文章(18)
Flora Amato, Mario Barbareschi, Valentina Casola, Antonino Mazzeo, An FPGA-Based Smart Classifier for Decision Support Systems Studies in Computational Intelligence. pp. 289- 299 ,(2014) , 10.1007/978-3-319-01571-2_34
Flora Amato, Mario Barbareschi, Valentina Casola, Antonino Mazzeo, Sara Romano, Towards Automatic Generation of Hardware Classifiers Algorithms and Architectures for Parallel Processing. pp. 125- 132 ,(2013) , 10.1007/978-3-319-03889-6_14
Rocco Aversa, Beniamino Di Martino, Francesco Moscato, Critical Systems Verification in MetaMORP(h)OSY international conference on computer safety, reliability, and security. pp. 119- 129 ,(2014) , 10.1007/978-3-319-10557-4_15
Przemyslaw Kukielka, Zbigniew Kotulski, Adaptation of the neural network-based IDS to new attacks detection arXiv: Cryptography and Security. ,(2010)
Giovanna Sannino, Giuseppe De Pietro, An Evolved eHealth Monitoring System for a Nuclear Medicine Department 2011 Developments in E-systems Engineering. pp. 3- 6 ,(2011) , 10.1109/DESE.2011.67
Francesco Moscato, Model Driven Engineering and Verification of Composite Cloud Services in MetaMORP(h)OSY 2014 International Conference on Intelligent Networking and Collaborative Systems. pp. 635- 640 ,(2014) , 10.1109/INCOS.2014.38
Francesco Colace, Massimo De Santo, Luca Greco, A Probabilistic Approach to Tweets' Sentiment Classification 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction. ,vol. 1, pp. 37- 42 ,(2013) , 10.1109/ACII.2013.13
Abdulkader A. Alfantookh, DoS Attacks Intelligent Detection using Neural Networks Journal of King Saud University - Computer and Information Sciences. ,vol. 18, pp. 31- 51 ,(2006) , 10.1016/S1319-1578(06)80002-9
Win-Harn Liu, Tom Chen, Cang-Mou Cao, Chuen-Mei Ma, Cong Meng, Network intrusion detection system ,(2008)
Marvin Lee Minsky, Seymour Papert, Perceptrons: An Introduction to Computational Geometry ,(1969)