FP-ANK: An Improvised Intrusion Detection System with Hybridization of Neural Network and K-Means Clustering over Feature Selection by PCA

被引:0
作者
Biswas, Noor Ahmed [1 ]
Tammi, Wasima Matin [1 ]
Shah, Faisal Muhammad [1 ]
Chakraborty, Saikat [1 ]
机构
[1] Ahsanullah Univ Sci & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
来源
2015 18TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT) | 2015年
关键词
Intrusion Detection System; Principal Component Analysis; Artificial Neural Network; K-means Clustering; NSL-KDD;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection System (IDS) predominantly works for detecting malicious attacks. Many researchers have proposed the IDS with different techniques to achieve the best accuracy with the consolidation of Clustering and Artificial Neural Network (ANN). Clustering and ANN based models give better precision rate with better accuracy where attack records are low. Nevertheless, all the features of dataset are not relevant for classifying different attacks. So, feature selection can improve the stability and accuracy of IDS. In this paper, it is proposed that IDS with the amalgamation of best efficient features selected by Principal Component Analysis (PCA) can reduce the computational complexity of the system. It has been combined with the K-means clustering technique to cluster the specific groups of attacks and Artificial Neural Network to get a preeminent output by training the formulation of different base models. The model name has been defined by FP-ANK model. Investigational results have been reported on the NSL-KDD dataset where the accuracy rate associating with other models is distinct to validate the proposed system.
引用
收藏
页码:317 / 322
页数:6
相关论文
共 22 条
  • [1] [Anonymous], 1995, SRICSL9507
  • [2] [Anonymous], 2002, PROC ITC CSCC
  • [3] Barbara D., 2001, SDM, P1, DOI DOI 10.1137/1.9781611972719.28
  • [4] Beghdad R., 2008, COMPUT SECUR, V27, P186
  • [5] Everitt B. S., CLUSTER ANAL
  • [6] Fox K. L., 1990, 13th National Computer Security Conference. Proceedings. Information Systems Security. Standards - the Key to the Future, P125
  • [7] The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
    Joo, D
    Hong, T
    Han, I
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2003, 25 (01) : 69 - 75
  • [8] Kriesel D., 2014, BRIEF INTRO NEURAL N
  • [9] Lisehroodi M. M., 2013, 4 INT C COMP INF ICO
  • [10] Network intrusion and fault detection: A statistical anomaly approach
    Manikopoulos, C
    Papavassiliou, S
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 76 - 82