Neural Network based Intrusion Detection Systems

作者: Sodiya A.S , Ojesanmi O.A , Akinola A. , Aborisade O

DOI: 10.5120/18705-9636

关键词:

摘要: Recent Intrusion Detection Systems (IDSs) which are used to monitor real-time attacks on computer and network systems still faced with problems of low detection rate, high false positive, negative alert flooding. This paper present a Neural Network-based approach that combined supervised unsupervised learning techniques designed correct some these problems. The design is divided into two phases namely: Training Detection. In the training phase, Multiple Self–Organizing Map algorithm (SOM) was constructed capture number different input patterns, discover significant features in patterns learn how classify input. Sigmoid Activation Function (SAF) transform reasonable value (0, 1). weights were randomly assigned range (-1, +1) obtain output consistent training. SAF represented using hyperbolic tangent order increase speed make efficient. Momentum adaptive rates introduced significantly improve performance back-propagation neural network. trained lattice neuron as back propagation for monitoring intrusive activities. implemented Visual Basic.Net. An evaluation carried out Network Traffic data collected from Defence Advanced Research Projects Agency dataset consisting normal traffic. model performed by means Root Mean Square (RMS) error analysis rate 0.70, 4 layers, 8 hidden layers 2 layers. result new showed promising improved technique when compared recent best known related work.

参考文章(22)
Robert Birkely, Vallipuram Muthukkumarasamy, An Intelligent Intrusion Detection System Based on Neural Network IADIS International Conference Applied Computing 2004. ,(2004)
Stephen Northcutt, Judy Novak, Network Intrusion Detection ,(1999)
Teuvo Kohonen, Self-Organizing Maps ,(1995)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
A.S. Sodiya, H.O.D. Longe, A.T. Akinwale, A new two‐tiered strategy to intrusion detection Information Management & Computer Security. ,vol. 12, pp. 27- 44 ,(2004) , 10.1108/09685220410518810
Win-Harn Liu, Tom Chen, Cang-Mou Cao, Chuen-Mei Ma, Cong Meng, Network intrusion detection system ,(2008)
Inger Marie Løes, Heike Immervoll, Jon-Helge Angelsen, Arild Horn, Jürgen Geisler, Christian Busch, Per Eystein Lønning, Stian Knappskog, None, Performance comparison of three BRAF V600E detection methods in malignant melanoma and colorectal cancer specimens. Tumor Biology. ,vol. 36, pp. 1003- 1013 ,(2015) , 10.1007/S13277-014-2711-5
P. Gogoi, D. K. Bhattacharyya, B. Borah, J. K. Kalita, MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method The Computer Journal. ,vol. 57, pp. 602- 623 ,(2014) , 10.1093/COMJNL/BXT044
Sherif M.Badr, Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS) International Journal of Computer Applications. ,vol. 61, pp. 41- 49 ,(2013) , 10.5120/9918-4526