scholarly journals Classification of Intrusion using Artificial Neural Network with GWO

In the present milieu of connected world, where security is the major concern, Intrusion Detection System is the prominent area of research to deal with various types of attacks in network. Intrusion detection systems (IDS) finds the dynamic and malicious traffic of network, in accordance to the aspect of network. Various form of IDS has been developed working on distinctive approaches. One popular approach is machine learning in which various algorithms like ANN, SVM etc. have been used. But the most prominent method used is ANN. The performance of the ANN can significantly be improved by combining it with different metaheuristic algorithms. In present work, GWO is used to optimize ANN. For this KDD-99 data-set is used to classify various types of attacks i.e. denial of service (DOS), normal and other form of attack. The present paper provides detailed analysis of the performance of Artificial Neural Network and optimized Artificial Neural Network with GA, PSO and GWO. The research shows that ANN with GWO outperform as compared to others (ANN, ANN with PSO and ANN with GA).

2019 ◽  
Vol 16 (8) ◽  
pp. 3242-3245
Author(s):  
R. Ramadevi ◽  
N. R. Krishnamoorthy ◽  
D. Marshiana ◽  
Sujatha Kumaran ◽  
N. Aarthi

Internet of things (IoT) is a revolutionary technology which changes our life and work. Many industry sectors such as manufacturing, transportation, utilities, health care, consumer electronics and automobiles are invested and adopted towards IoT technology. The major inconvenience with IoT is its safety, as it is prone to attack by hackers. Detection Systems are used to detect these intrusions to protect the information and communication systems. Hence it is essential to design an intrusion detection system for security threats of IoT networks. This paper focuses, on the development of Artificial Neural Network (ANN) based Intrusion Detection System for threat analysis in IoT network. KDD-99 data set with Denial of Service (DoS) type attack is used to train and test three different ANN models. In this research, a Feed Forward Back Propagation (FFBP) network is used to detect the DoS attack. The process of optimization of a FFBP network involves comparison of classification accuracy during both training and testing in terms of true positive and false positive rates. For the data set considered the optimised network has achieved 100% efficiency during both training and testing.


2012 ◽  
Vol 263-266 ◽  
pp. 2924-2928
Author(s):  
Jing Huang ◽  
Hai Bin Chen ◽  
Jiang Zhang ◽  
Han Bo Zhang

In this paper, some scholars’ idea of applying neural network technology in the design of hacker intrusion detection system model and making a hacker intrusion detection system model based on artificial neural network is adopted. This study selects KDDCup’99 for network intrusion detection data set to learn the characteristics of the intrusion accurately; completes the normalization of all characteristics to achieve rapid convergence of the artificial neural network; analyses the advantages and disadvantages of different neural network training functions; achieves a high accuracy rate for intrusion detection successfully.


Author(s):  
Abdulrahman Jassam Mohammed ◽  
Muhanad Hameed Arif ◽  
Ali Adil Ali

<p>Massive information has been transmitted through complicated network connections around the world. Thus, providing a protected information system has fully consideration of many private and governmental institutes to prevent the attackers. The attackers block the users to access a particular network service by sending a large amount of fake traffics. Therefore, this article demonstrates two-classification models for accurate intrusion detection system (IDS). The first model develops the artificial neural network (ANN) of multilayer perceptron (MLP) with one hidden layer (MLP1) based on distributed denial of service (DDoS). The MLP1 has 38 input nodes, 11 hidden nodes, and 5 output nodes. The training of the MLP1 model is implemented with NSL-KDD dataset that has 38 features and five types of requests. The MLP1 achieves detection accuracy of 95.6%. The second model MLP2 has two hidden layers. The improved MLP2 model with the same setup achieves an accuracy of 2.2% higher than the MLP1 model. The study shows that the MLP2 model provides high classification accuracy of different request types.</p>


2018 ◽  
Vol 27 (2) ◽  
pp. 135-147 ◽  
Author(s):  
Rafath Samrin ◽  
Devara Vasumathi

AbstractDespite the rapid developments in data technology, intruders are among the most revealed threats to security. Network intrusion detection systems are now a typical constituent of network security structures. In this paper, we present a combined weighted K-means clustering algorithm with artificial neural network (WKMC+ANN)-based intrusion identification scheme. This paper comprises two modules: clustering and intrusion detection. The input dataset is gathered into clusters with the usage of WKMC in clustering module. In the intrusion detection module, the clustered information is trained with the utilization of ANN and its structure is stored. In the testing process, the data are tested by choosing the most suitable ANN classifier, which corresponds to the closest cluster to the test data, according to distance or similarity measures. For experimental evaluation, we used the benchmark database, and the results clearly demonstrated that the proposed technique outperformed the existing technique by having better accuracy.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Erxue Min ◽  
Jun Long ◽  
Qiang Liu ◽  
Jianjing Cui ◽  
Wei Chen

As we head towards the IoT (Internet of Things) era, protecting network infrastructures and information security has become increasingly crucial. In recent years, Anomaly-Based Network Intrusion Detection Systems (ANIDSs) have gained extensive attention for their capability of detecting novel attacks. However, most ANIDSs focus on packet header information and omit the valuable information in payloads, despite the fact that payload-based attacks have become ubiquitous. In this paper, we propose a novel intrusion detection system named TR-IDS, which takes advantage of both statistical features and payload features. Word embedding and text-convolutional neural network (Text-CNN) are applied to extract effective information from payloads. After that, the sophisticated random forest algorithm is performed on the combination of statistical features and payload features. Extensive experimental evaluations demonstrate the effectiveness of the proposed methods.


Internet of Things (IoT) makes everything in the real world to get connected. The resource constrained characteristics and the different types of technology and protocols tend to the IoT be more vulnerable than the conventional networks. Intrusion Detection System (IDS) is a tool which monitors analyzes and detects the abnormalities in the network activities. Machine Learning techniques are implemented with the Intrusion detection systems to enhance the performance of IDS. Various studies on IoT reveals that Artificial Neural Network (ANN) provides better accuracy and detection rate than other approaches. In this paper, an Artificial Neural Network based IDS (ANNIDS) technique based on Multilayer Perceptron (MLP) is proposed to detect the attacks initiated by the Destination Oriented Direct Acyclic Graph Information Solicitation (DIS) attack and Version attack in IoT environment. Contiki O.S/Cooja Simulator 3.0 is used for the IoT simulation.


Author(s):  
S. Vijaya Rani ◽  
G. N. K. Suresh Babu

The illegal hackers  penetrate the servers and networks of corporate and financial institutions to gain money and extract vital information. The hacking varies from one computing system to many system. They gain access by sending malicious packets in the network through virus, worms, Trojan horses etc. The hackers scan a network through various tools and collect information of network and host. Hence it is very much essential to detect the attacks as they enter into a network. The methods  available for intrusion detection are Naive Bayes, Decision tree, Support Vector Machine, K-Nearest Neighbor, Artificial Neural Networks. A neural network consists of processing units in complex manner and able to store information and make it functional for use. It acts like human brain and takes knowledge from the environment through training and learning process. Many algorithms are available for learning process This work carry out research on analysis of malicious packets and predicting the error rate in detection of injured packets through artificial neural network algorithms.


Sign in / Sign up

Export Citation Format

Share Document