An empirical model in intrusion detection systems using principal component analysis and deep learning models

被引:9
作者
Rajadurai, Hariharan [1 ]
Gandhi, Usha Devi [1 ]
机构
[1] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
关键词
deep learning; logistic regression; principal component analysis; random forest; support vector machine;
D O I
10.1111/coin.12342
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data are a main resource of a computer system, which can be transmitted over network from source to destination. While transmitting, it faces lot of security issues such as virus, malware, infection, error, and data loss. The security issues are the attacks that have to be detected and eliminated in efficient way to guarantee the secure transmission. The attack detection rates of existing Intrusion Detection Systems (IDS) are low, because the number of unknown attacks are high when compared to the known attacks in the network. Thus, recent researchers focus more on evaluation of known attacks attributes, that will help in identification of the attacks. But the difficulty here is the nature of the IDS datasets. The difficulty in any IDS dataset is to, too many attributes, irrelevant and unstructured in nature. So analyzing such attributes leads to a time consuming process and that produces an inefficient result. This article presents a combined approach Principle Component Analysis and Deep learning (PCA-DL) model to address above issues. The proposed PCA-DL method has achieved the accuracy 92.6% on detecting the attacks correctly.
引用
收藏
页码:1111 / 1124
页数:14
相关论文
共 26 条
[1]  
Alessandri D, 2000, LECT NOTES COMPUT SC, V1907, P183
[2]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[3]  
[Anonymous], 2015, International Journal of Advanced Research in Computer and Communication Engineering
[4]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[5]  
Balan EV, 2014, IEEE I C COMP INT CO, P893
[6]  
Balan EV, 2015, 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), P185, DOI 10.1109/ICCSP.2015.7322846
[7]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[8]  
Bouzida Y., 2004, EFFICIENT INTRUSION
[9]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[10]   PCA filtering and probabilistic SOM for network intrusion detection [J].
De la Hoz, Eduardo ;
De La Hoz, Emiro ;
Ortiz, Andres ;
Ortega, Julio ;
Prieto, Beatriz .
NEUROCOMPUTING, 2015, 164 :71-81