Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network

被引:45
|
作者
Sheikhan, Mansour [1 ]
Jadidi, Zahra [1 ]
机构
[1] Islamic Azad Univ, South Tehran Branch, Fac Engn, Dept Elect Engn, Tehran, Iran
来源
NEURAL COMPUTING & APPLICATIONS | 2014年 / 24卷 / 3-4期
关键词
Flow-based anomaly detection; Computer networks; Neural network; Modified GSA; PSO; PARTICLE SWARM OPTIMIZATION; INTRUSION DETECTION; GENETIC ALGORITHM; IMPROVED PSO; SYSTEMS; OPERATORS; BEHAVIOR; ATTACKS; LEVEL;
D O I
10.1007/s00521-012-1263-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ever growing Internet causes the availability of information. However, it also provides a suitable space for malicious activities, so security is crucial in this virtual environment. The network intrusion detection system (NIDS) is a popular tool to counter attacks against computer networks. This valuable tool can be realized using machine learning methods and intrusion datasets. Traditional datasets are usually packet-based in which all network packets are analyzed for intrusion detection in a time-consuming process. On the other hand, the recent spread of 1-10-Gbps-technologies have clearly pointed out that scalability is a growing problem. In this way, flow-based solutions can help to solve the problem by reduction of data and processing time, opening the way to high-speed detection on large infrastructures. Besides, NIDS should be capable of detecting new malicious activities. Artificial neural network-based NIDSs can detect unseen attacks, so a multi-layer perceptron (MLP) neural classifier is used in this study to distinguish benign and malicious traffic in a flow-based NIDS. In this way, a modified gravitational search algorithm (MGSA), as a modern heuristic technique, is employed to optimize the interconnection weights of the neural anomaly detector. The proposed scheme is trained using an enhanced version of the first labeled flow-based dataset for intrusion detection introduced in 2009. In addition, the particle swarm optimization (PSO) algorithm and traditional error back-propagation (EBP) algorithm are employed to train MLP, so performance comparison becomes possible. The experimental results based on the actual network data show that the MGSA-optimized neural anomaly detector is effective for monitoring abnormal traffic flows in the gigabytes traffic environment, and the accuracy is about 97.8 %.
引用
收藏
页码:599 / 611
页数:13
相关论文
共 50 条
  • [1] Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network
    Mansour Sheikhan
    Zahra Jadidi
    Neural Computing and Applications, 2014, 24 : 599 - 611
  • [2] Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm
    Jadidi, Zahra
    Muthukkumarasamy, Vallipuram
    Sithirasenan, Elankayer
    Sheikhan, Mansour
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 76 - 81
  • [3] Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages
    Abuadlla, Yousef
    Kvascev, Goran
    Gajin, Slavko
    Jovanovic, Zoran
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (02) : 601 - 622
  • [4] A Flow-Based Network Intrusion Detection System for High-Speed Networks Using Meta-heuristic Scale
    Jyothsna, V.
    Mukesh, D.
    Sreedhar, A. N.
    COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [5] On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures
    Erlacher, Felix
    Dressler, Falko
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 495 - 506
  • [6] High-speed flow-based classification on FPGA
    Groleat, Tristan
    Vaton, Sandrine
    Arzel, Matthieu
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2014, 24 (04) : 253 - 271
  • [7] Flow-based Malware Detection Using Convolutional Neural Network
    Yeo, M.
    Koo, Y.
    Yoon, Y.
    Hwang, T.
    Ryu, J.
    Song, J.
    Park, C.
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 910 - 913
  • [8] Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
    Cordero, Carlos Garcia
    Hauke, Sascha
    Muhlhauser, Max
    Fischert, Mathias
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [9] Intelligent flow-based sampling for effective network anomaly detection
    Androulidakis, G.
    Papavassiliou, S.
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1948 - 1953
  • [10] Flow-based statistical aggregation schemes for network anomaly detection
    Song, Sui
    Ling, Li
    Manikopoulo, C. N.
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, : 786 - 791