Back propagation neural network approach to Intrusion Detection System

Author(s):  
I Mukhopadhyay ◽  
M Chakraborty ◽  
S Chakrabarti ◽  
T Chatterjee
Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1666
Author(s):  
Muataz Salam Al-Daweri ◽  
Khairul Akram Zainol Ariffin ◽  
Salwani Abdullah ◽  
Mohamad Firham Efendy Md. Senan

The significant increase in technology development over the internet makes network security a crucial issue. An intrusion detection system (IDS) shall be introduced to protect the networks from various attacks. Even with the increased amount of works in the IDS research, there is a lack of studies that analyze the available IDS datasets. Therefore, this study presents a comprehensive analysis of the relevance of the features in the KDD99 and UNSW-NB15 datasets. Three methods were employed: a rough-set theory (RST), a back-propagation neural network (BPNN), and a discrete variant of the cuttlefish algorithm (D-CFA). First, the dependency ratio between the features and the classes was calculated, using the RST. Second, each feature in the datasets became an input for the BPNN, to measure their ability for a classification task concerning each class. Third, a feature-selection process was carried out over multiple runs, to indicate the frequency of the selection of each feature. From the result, it indicated that some features in the KDD99 dataset could be used to achieve a classification accuracy above 84%. Moreover, a few features in both datasets were found to give a high contribution to increasing the classification’s performance. These features were present in a combination of features that resulted in high accuracy; the features were also frequently selected during the feature selection process. The findings of this study are anticipated to help the cybersecurity academics in creating a lightweight and accurate IDS model with a smaller number of features for the developing technologies.


2013 ◽  
Vol 441 ◽  
pp. 343-346 ◽  
Author(s):  
Ying Hu ◽  
Li Min Sun ◽  
Sheng Chen Yu ◽  
Jiang Lan Huang ◽  
Xiao Ju Wang ◽  
...  

In order to improve the detection rate of intruders in coal mine disaster warning internet of things, and to solve the problem that the back propagate neural network (BPNN) is invalid when these initial weight and threshold values of BPNN are chosen impertinently, Genetic Algorithms (GA) s characteristic of getting whole optimization value was combined with BPNNs characteristic of getting local precision value with gradient method. After getting an approximation of whole optimization value of weight and threshold values of BPNN by GA, the approximation was used as first parameter of BPNN, to train (educate) the BPNN again (in other words, learning). The educated BPNN was used to recognize intruders in internet of things. Experiment results shown that this method was useful and applicable, and the detection right rate of intruders was above 95% for the KDD CUP 1999 data set.


2017 ◽  
Vol 26 (1) ◽  
pp. 29-40 ◽  
Author(s):  
Shawq Malik Mehibs ◽  
Soukaena Hassan Hashim

Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate


Sign in / Sign up

Export Citation Format

Share Document