Critical study of neural networks in detecting intrusions

被引:52
作者
Beghdad, Rachid [1 ]
机构
[1] Fac Sci, Bejaia 06000, Algeria
关键词
Intrusion detection systems; Neural networks; Misuse intrusion detection; KDD features; Attack categories;
D O I
10.1016/j.cose.2008.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a critical study about the use of some neural networks (NNs) to detect and classify intrusions. The aim of our research is to determine which NN classifies well the attacks and leads to the higher detection rate of each attack. This study focused on two classification types of records: a single class (normal, or attack), and a multiclass, where the category of attack is also detected by the NN. Five different types of NNs were tested: multilayer perceptron (MLP), generalized feed forward (GFF), radial basis function (RBF), self-organizing feature map (SOFM), and principal component analysis (PCA) NN. A KDD data subset containing 18,285 records manually chosen was trained in order to be tested on the KDD testing set. our simulations show that the GFF NN leads to the best confusion matrix in the multiclass case. For the same case, the RBF performs the higher detection rate of the DoS attack category. In the single class case, the PCA NN performs the higher detection rate. (c) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:168 / 175
页数:8
相关论文
共 18 条
  • [1] Amor N.B., 2004, P 2004 ACM S APPL CO, P420, DOI DOI 10.1145/967900.967989
  • [2] [Anonymous], 1999, KDD DAT SET
  • [3] [Anonymous], P 1998 NAT INF SYST
  • [4] [Anonymous], PATTERN RECOGNITION
  • [5] CUNNINGHAM R, 1999, P INT S REC ADV INTR
  • [6] CURT L, 1994, NEUROSOLUTIONS VERSI
  • [7] Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
  • [8] Faraoun K.M., 2007, INT J COMPUT INTELL, V3, P161
  • [9] Detecting anomalous and unknown intrusions against programs
    Ghosh, AK
    Wanken, J
    Charron, F
    [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 259 - 267
  • [10] GHOSH AK, 1999, P 8 USENIX SEC S