Network Intrusion Detection using Neural Network Based Classifiers

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-59 Number-3
Year of Publication : 2018
Authors : Ashalata Panigrahi, Manas Ranjan Patra
DOI :  10.14445/22312803/IJCTT-V59P121


Ashalata Panigrahi, Manas Ranjan Patra "Network Intrusion Detection using Neural Network Based Classifiers". International Journal of Computer Trends and Technology (IJCTT) V59(3):121-125, May 2018. ISSN:2231-2803. Published by Seventh Sense Research Group.

Rapid expansion of computer networks throughout the world has made data security a major concern. In the recent past, there have been incidences of cyber-attacks which have put data at risk. Therefore, developing effective techniques to secure valuable data from such attacks is the need of the hour. Several intrusion detection techniques have been developed to deal with network attacks and raise alerts in a timely manner in order to mitigate the impact of such attacks. Among others, ANN methods can provide multilevel, multivariable security system to meet organizational needs. In this work, we have applied four prominent neural network based classification techniques, viz., Self-Organizing Map, Projective Adaptive Resonance Theory, Radial Basis Function Network, and Sequential Minimal Optimization to predict possible intrusive behavior of network users. The performance of these techniques have been evaluated in terms of accuracy, precision, recall / detection rate, F-Measure, and false alarm rate on the standard NSL-KDD intrusion dataset.

[1] G. Stein, B. Chen, A. S. Wu, K. A. Hua, “Decision tree classifier for network intrusion detection with GA based feature selection” ACM-SE 43: Proceedings of the 43rd annual Southeast regional conference- Vol. 2, p.136-141, 2005..
[2] M.Ektefa, S. Memar, F. Sidi, L. S. Affende. “Intrusion detection using Data Mining Techniques”, Proceedings of IEEE International Conference on Information Retrieval & Knowledge Management, Exploring Invisible World, CAMP’ 10, p. 200-203, 2010..
[3] S. Gong,“Feature Selection Method for Network Intrusion Based on GQPSO Attribute Reduction”, International Conference on Multimedia Technology (ICMT), p.6365 – 6368, 2011..
[4] Y.Y. Chung, N.Wahid, “A hybrid network intrusion detection system using simplified swarm optimization (SSO)”, Applied Soft Computing, p. 3014-3022, 2012..
[5] L. Koc, T.A.Mazzuchi, and S. Sarkani, “A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier”, Expert Systems with Applications, 39(18), p.13492- 13500, 2012..
[6] F. Zeng, K. Yin, M. Chen. “A new anomaly detection method based on rough set reduction and HMM”, Eight IEEE/ACIS International Conference On Computer and Information science, p. 285-289, 2009..
[7] T.Kohonen, “The Self-Organizing Map”. In the Proceedings of the IEEE, Vol.78, Issue: 9, p. 1464-1480, 1990.
[8] Y. Cao, J. Wu, “Projective ART for clustering data sets in high dimensional spaces” Neural Networks, vol.15, p. 105-120, 2002.
[9] S.V. Chakravarthy and J.Ghosh, “Scale based clustering using radial basis function networks”, Proceeding of IEEE International Conference on Neural Networks, p.897-902, 1994.
[10] J. Platt, “Fast training of support vector machines using sequential minimal optimization”, in Advances in Kernel Methods – Support Vector Learning, MIT Press, 1998.
[11] M.Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set”, Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defence Applications, p.1-6, 2009

Intrusion detection, ANN, Classification, SOM, PART, RBFN, SMO, Ant Search, Random Search