Comparative Study of Conjugate Gradient to Optimize Learning Process of Neural Network for Intrusion Detection System (IDS)

被引:0
|
作者
Wisesty, Untari N. [1 ]
Adiwijaya [1 ]
机构
[1] Telkom Univ, Sch Comp, Bandung, Indonesia
来源
2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH) | 2017年
关键词
intrusion detection system; conjugate gradient; line search; cackpropagation; neural network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) is a device or software application that monitors and inspects all inbound and outbound network activities, identifies suspicious patterns that may be a network attack from someone attempting to break into or compromise a system. IDS categorize in two ways, namely misuse detection and anomaly detection. In this research, intrusion detection was done by anomaly detection. The data used is KDDCUP dataset 1999, which has 4 types of attacks, namely DoS, U2R, R2L, and Prob. Anomaly detection was built using Backpropagation algorithm optimized by Conjugate Gradient algorithm. In this paper, it was implemented and analyzed the use of CG optimization (Fletcher Reeves, Polak Ribiere, Powell Beale) in the process of backpropagation learning for IDS. Moreover, to minimize the performance of learning rate parameter, four types of line search techniques used, i.e. Brent Search, Golden Section Search, Charalambous Search and Hybrid Bisection-cubic Search. Based on the experiment results, the proposed scheme gives the best accuracy when the data is divided into two classes with a proportion of normal and intrusion data was balanced, with an average accuracy of 93.2%. Meanwhile, the multi class classification model has an average f-measure of 54.13%. The best performance was obtained by using Conjugate Gradient-Fletcher Reeves optimization method and line search method Hybrid Bisection-Cubic Search.
引用
收藏
页码:459 / 464
页数:6
相关论文
共 50 条
  • [31] Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network
    Venkatachalam, V.
    Selvan, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (02): : 255 - 263
  • [32] Improved competitive learning neural networks for network intrusion and fraud detection
    Lei, John Zhong
    Ghorbani, Ali A.
    NEUROCOMPUTING, 2012, 75 (01) : 135 - 145
  • [33] A recalling-enhanced recurrent neural network: Conjugate gradient learning algorithm and its convergence analysis
    Gao, Tao
    Gong, Xiaoling
    Zhang, Kai
    Lin, Feng
    Wang, Jian
    Huang, Tingwen
    Zurada, Jacek M.
    INFORMATION SCIENCES, 2020, 519 (273-288) : 273 - 288
  • [34] NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System
    Ezeife, C. I.
    Rahman, Md. Zillur
    PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL DATABASE ENGINEERING & APPLICATIONS SYMPOSIUM (IDEAS '10), 2010, : 38 - 41
  • [35] NL-IDS: Trust Based Intrusion Detection System for Network layer in Wireless Sensor Networks
    Ghugar, Umashankar
    Pradhan, Jayaram
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 512 - 516
  • [36] TCAN-IDS: Intrusion Detection System for Internet of Vehicle Using Temporal Convolutional Attention Network
    Cheng, Pengzhou
    Xu, Kai
    Li, Simin
    Han, Mu
    SYMMETRY-BASEL, 2022, 14 (02):
  • [37] A Study of Intrusion Detection System in Wireless Sensor Network
    Agarwal, Atul
    Kaushal, Narottam Chand
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 337 - 343
  • [38] The Study and Simulation on Campus Network Intrusion Detection System
    Xie, Ping
    Wang, Wei
    MECHATRONICS AND INTELLIGENT MATERIALS II, PTS 1-6, 2012, 490-495 : 2657 - 2661
  • [39] Intelligent Intrusion Detection System Model Using Rough Neural Network
    YAN Huai-zhi 1
    2.National Key Laboratory of Mechatronics Engineering and Control
    Wuhan University Journal of Natural Sciences, 2005, (01) : 119 - 122
  • [40] An Analysis of Intrusion Detection System using Back Propagation Neural Network
    Jaiganesh, V.
    Sumathi, P.
    Mangayarkarasi, S.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 232 - 236