Open Access Open Access  Restricted Access Subscription or Fee Access

An Improvement of Neural Network Algorithm for Anomaly Intrusion Detection System


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v10i2.18735

Abstract


In this study, the focus has been on analyzing various types of network attacks using machine learning algorithms. A model based on Neural Networks and Deep Learning for detecting network attacks has been evaluated. The proposed model has been tested on CICIDS2017 dataset. The performance of the presented algorithm is compared against a set of other machine learning algorithms; k-Nearest Neighbors, Interactive Dichotomizer 3, Random Forest, Naïve Bayes, Adaboost, Quadratic Discriminant Analysis, and Multiplayer Perceptron. Results have showed that the adopted neural network algorithm presents a better accuracy of detecting different types of network attacks. An accuracy of up to 99% has been attainted, and false negative alarms have been reduced. Finally, it has been found out that by using a deep learning approach time of detection is reduced to half of time.
Copyright © 2020 Praise Worthy Prize - All rights reserved.

Keywords


Neural Network; Intrusion Detection System; Deep Learning

Full Text:

PDF


References


J. Jabez and B. Muthukumar, "Intrusion detection system (IDS): anomaly detection using outlier detection approach," Procedia Computer Science, vol. 48, pp. 338-346, 2015.
https://doi.org/10.1016/j.procs.2015.04.191

B. Atli, Anomaly-based intrusion detection by modeling probability distributions of flow characteristics, Ph.D. Thesis, Aalto University, Helsinki, Finland, 2017.

S. Potluri and C. Diedrich, "Deep feature extraction for multi-class intrusion detection in industrial control systems," International Journal of Computer Theory and Engineering, vol. 9, no. 5, pp. 374-379, 2017.
https://doi.org/10.7763/ijcte.2017.v9.1169

A. Pannu, "Artificial intelligence and its application in different areas," Artificial Intelligence, vol. 4, no. 10, pp. 79-84, 2015.

I. Goodfellow, Y. Bengio, and A. Courville, Deep learning. MIT press, 2016.

G. Kim, H. Yi, J. Lee, Y. Paek, and S. Yoon, "LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems," arXiv preprint arXiv:1611.01726, 2016.

M. I. Jordan and T. M. Mitchell, "Machine learning: Trends, perspectives, and prospects," Science, vol. 349, no. 6245, pp. 255-260, 2015.
https://doi.org/10.1126/science.aaa8415

A. A. Hadi, "Performance analysis of big data intrusion detection system over random Forest algorithm," International Journal of Applied Engineering Research, vol. 13, no. 2, pp. 1520-1527, 2018.

J. Malviya, V. Patel, and A. Srivastava, "New Naïve Bayes Classifier for Improve Intrusion Detection System Accuracy," International Research Journal of Engineering and Applied Science, vol. 5, no. 5, pp. 7 - 11, 2017.

A. S. Eesa, Z. Orman, and A. M. A. Brifcani, "A new feature selection model based on ID3 and bees algorithm for intrusion detection system," Turkish Journal of Electrical Engineering & Computer Sciences, vol. 23, no. 2, pp. 615-622, 2015.
https://doi.org/10.3906/elk-1302-53

I. Ahmed, "Enhancement of network attack classification using particle swarm optimization and multi-layer perceptron," International Journal of Computer Application, vol. 137, no. 12, pp. 18-22, 2016.
https://doi.org/10.5120/ijca2016908987

U. Raghavendra, U. R. Acharya, H. Fujita, A. Gudigar, J. H. Tan, and S. Chokkadi, "Application of Gabor wavelet and Locality Sensitive Discriminant Analysis for automated identification of breast cancer using digitized mammogram images," Applied Soft Computing, vol. 46, pp. 151-161, 2016.
https://doi.org/10.1016/j.asoc.2016.04.036

W. Cao, "Quadratic discriminant analysis revisited," City University of New York, 2015.

L. H. Yeo, X. Che, and S. Lakkaraju, "Understanding Modern Intrusion Detection Systems: A Survey," arXiv preprint arXiv:1708.07174, 2017.

A. L. Maas, A. Y. Hannun, and A. Y. Ng, "Rectifier nonlinearities improve neural network acoustic models," in Proc. icml, 2013, vol. 30, no. 1, p. 3.

A. Candel, V. Parmar, E. LeDell, and A. Arora, "Deep learning with H2O," H2O. ai Inc, 2016.

A. Pharate, H. Bhat, V. Shilimkar, and N. Mhetre, "Classification of intrusion detection system," International Journal of Computer Applications, vol. 118, no. 7, pp. 28 - 33, 2015.
https://doi.org/10.5120/20758-3163

S. Vijayarani and S. Maria, " Intrusion detection system – a study," International Journal of Security, Privacy and Trust Management (IJSPTM), vol. 4, no. 4, pp. 31 - 44, 2015.

M. Moradi and M. Zulkernine, "A neural network based system for intrusion detection and classification of attacks," in Proceedings of the IEEE International Conference on Advances in Intelligent Systems-Theory and Applications, 2004, pp. 15-18.

H. A. Dau, V. Ciesielski, and A. Song, "Anomaly detection using replicator neural networks trained on examples of one class," in Asia-Pacific Conference on Simulated Evolution and Learning, 2014: Springer, pp. 311-322.
https://doi.org/10.1007/978-3-319-13563-2_27

W. M. Tammi, N. A. Biswas, Z. Nasim, K. Z. Shorna, and F. M. Shah, "Artificial neural network based system for intrusion detection using clustering on different feature selection," International Journal of Computer Applications, vol. 126, no. 12, pp. 21-28, 2015.
https://doi.org/10.5120/ijca2015906244

N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, "A deep learning approach to network intrusion detection," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41-50, 2018.
https://doi.org/10.1109/tetci.2017.2772792

C. Yin, Y. Zhu, J. Fei, and X. He, "A deep learning approach for intrusion detection using recurrent neural networks," IEEE Access, vol. 5, pp. 21954-21961, 2017.
https://doi.org/10.1109/access.2017.2762418

S. Mohammadi and A. Namadchian, "A new deep learning approach for anomaly base IDS using memetic classifier," International Journal of Computers Communications & Control, vol. 12, no. 5, pp. 677-688, 2017.
https://doi.org/10.15837/ijccc.2017.5.2972

I. Sharafaldin, A. Gharib, A. H. Lashkari, and A. A. Ghorbani, "Towards a reliable intrusion detection benchmark dataset," Software Networking, vol. 2018, no. 1, pp. 177-200, 2018.
https://doi.org/10.13052/jsn2445-9739.2017.009

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," presented at the ICISSP, 2018.
https://doi.org/10.5220/0006639801080116

A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, and A. A. Ghorbani, "Characterization of Tor Traffic using Time based Features," presented at the ICISSP, 2017.
https://doi.org/10.5220/0006105602530262

Eddelbuettel, "CRAN task view: High-performance and parallel computing with R," 2018.
https://cran.r-project.org/web/views/HighPerformanceComputing.html

S. K. Kumar, "On weight initialization in deep neural networks," arXiv preprint arXiv:1704.08863, 2017.

Aldwairi, M., Mardini, W., Alhowaide, A., Anomaly Payload Signature Generation System Based on Efficient Tokenization Methodology, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (5), pp. 421-429.
https://doi.org/10.15866/irecap.v8i5.12794

Shurman, M., Al-Jarrah, O., Esoh, S., Alnabelsi, S., An Enhanced Cross-Layer Approach Based on Fuzzy-Logic for Securing Wireless Ad-Hoc Networks from Black Hole Attacks, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (2), pp. 174-185.
https://doi.org/10.15866/irecap.v8i2.13856

Surantha, N., Liujaya, S., Sunardy, A., Harvy, I., Design and Evaluation of Indoor Positioning System for User Access Management in Data Center, (2019) International Journal on Communications Antenna and Propagation (IRECAP), 9 (6), pp. 393-402.
https://doi.org/10.15866/irecap.v9i6.17026


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize