Network intrusion detection algorithm based on deep neural network

被引:64
作者
Jia, Yang [1 ]
Wang, Meng [1 ]
Wang, Yagang [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Comp Sci, Changan West St Changan Dist, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
neural nets; security of data; network intrusion detection algorithm; network technology; intrusion features; NSL-KDD training data; NSL-KDD dataset; NDNN model; deep neural network model; KDD99 training data; EXTREME LEARNING-MACHINE; FEATURE-SELECTION; DETECTION SYSTEM;
D O I
10.1049/iet-ifs.2018.5258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of network technology, active defending of the network intrusion is more important than before. In order to improve the intelligence and accuracy of network intrusion detection and reduce false alarms, a new deep neural network (NDNN) model based intrusion detection method is designed. A NDNN with four hidden layers is modelled to capture and classify the intrusion features of the KDD99 and NSL-KDD training data. Experiments on KDD99 and NSL-KDD dataset shows that the NDNN-based method improves the performance of the intrusion detection system (IDS) and the accuracy rate can be obtained as high as 99.9%, which is higher when compared with other dozens of intrusion detection methods. This NDNN model can be applied in IDS to make the system more secure.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 34 条
[1]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[2]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[3]  
[Anonymous], 2017, P 2016 15 IEEE INT C
[4]   Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Shi, Yong .
KNOWLEDGE-BASED SYSTEMS, 2017, 126 :113-126
[5]  
Boujnouni M. E., 2018, International Journal of Network Security, V20, P25
[6]  
Chae HeeSu., 2013, RECENT ADV COMPUTER, P184
[7]  
Chandrasekhar A.M., 2013, EFFECTIVE TECHNIQUE
[8]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[9]   Feature selection and classification using flexible neural tree [J].
Chen, Yuehui ;
Abraham, Ajith ;
Yang, Bo .
NEUROCOMPUTING, 2006, 70 (1-3) :305-313
[10]  
Chun-Lin L.I., 2014, INFORM SECURITY COMM, P68