Intrusion detection using reduced-size RNN based on feature grouping

被引:92
作者
Sheikhan, Mansour [1 ]
Jadidi, Zahra [2 ]
Farrokhi, Ali [2 ]
机构
[1] Islamic Azad Univ, Fac Engn, Dept Commun Engn, S Tehran Branch, Tehran, Iran
[2] Islamic Azad Univ, S Tehran Branch, Dept Elect Engn, Tehran, Iran
关键词
Partial connection; Recurrent neural network; Intrusion detection; Feature grouping; NEURAL-NETWORKS;
D O I
10.1007/s00521-010-0487-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is well-known as an essential component to secure the systems in Information and Communication Technology (ICT). Based on the type of analyzing events, two kinds of Intrusion Detection Systems (IDS) have been proposed: anomaly-based and misuse-based. In this paper, three-layer Recurrent Neural Network (RNN) architecture with categorized features as inputs and attack types as outputs of RNN is proposed as misuse-based IDS. The input features are categorized to basic features, content features, time-based traffic features, and host-based traffic features. The attack types are classified to Denial-of-Service (DoS), Probe, Remote-to-Local (R2L), and User-to-Root (U2R). For this purpose, in this study, we use the 41 features per connection defined by International Knowledge Discovery and Data mining group (KDD). The RNN has an extra output which corresponds to normal class (no attack). The connections between the nodes of two hidden layers of RNN are considered partial. Experimental results show that the proposed model is able to improve classification rate, particularly in R2L attacks. This method also offers better Detection Rate (DR) and Cost Per Example (CPE) when compared to similar related works and also the simulated Multi-Layer Perceptron (MLP) and Elman-based intrusion detectors. On the other hand, False Alarm Rate (FAR) of the proposed model is not degraded significantly when compared to some recent machine learning methods.
引用
收藏
页码:1185 / 1190
页数:6
相关论文
共 32 条
[1]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[2]  
[Anonymous], INT JT C NEUR NETWOR
[3]  
[Anonymous], RC21719 IBM RES DIV
[4]   Critical study of neural networks in detecting intrusions [J].
Beghdad, Rachid .
COMPUTERS & SECURITY, 2008, 27 (5-6) :168-175
[5]  
Beghdad R, 2007, NEURAL NETW WORLD, V17, P81
[6]   A comparison of Intrusion Detection Systems [J].
Biermann, E ;
Cloete, E ;
Venter, LM .
COMPUTERS & SECURITY, 2001, 20 (08) :676-683
[7]  
Cansian AM, 1997, P INT C COMP INT MUL, P276
[8]   Hybrid flexible neural-tree-based intrusion detection systems [J].
Chen, Yuehui ;
Akbraham, Ajith ;
Yang, Bo .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2007, 22 (04) :337-352
[9]  
DEBAR H, 1992, P INT JOINT C NEUR N, V2, P478
[10]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232