Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems

被引:0
|
作者
Ahmad, Iftikhar [1 ,2 ]
Ansari, M. A. [1 ,2 ]
Mohsin, Sajjad [1 ,2 ]
机构
[1] FUUAST, Dept Comp Sci, Islamabad, Pakistan
[2] COMSATS Inst Informat Technol, Islamabad, Pakistan
来源
RECENT ADVANCES IN SYSTEMS, COMMUNICATIONS AND COMPUTERS | 2008年
关键词
intrusion detection; backpropagation; neural networks; IDS (Intrusion Detection System); learning algorithm; dataset;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper a topology of neural network intrusion detection system is proposed on which different backpropagation algorithms are benchmarked. The proposed methodology uses sampled data from KddCup99 data set, an intrusion detection attacks database that is a standard for the evaluation of intrusion detection systems. The performance of backpropagation algorithms implemented in batch mode, is addressed. A comparative analysis of algorithms is made and then the most optimum solution is selected with respect to mean square error.
引用
收藏
页码:47 / +
页数:2
相关论文
共 50 条
  • [1] Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems
    Ahmad, Iftikhar
    Ansari, M. A.
    Mohsin, Sajjad
    PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON NEURAL NETWORKS (NN' 08): ADVANCED TOPICS ON NEURAL NETWORKS, 2008, : 231 - +
  • [2] The Comparison of Clustering Algorithms for Network Intrusion Detection
    Tong, Hongyan
    Zhu, Anmin
    Guo, Yanmei
    INTERNATIONAL CONFERENCE ON ELECTRICAL AND CONTROL ENGINEERING (ICECE 2015), 2015, : 702 - 707
  • [3] A comparison of neural projection techniques applied to Intrusion Detection Systems
    Herrero, Alvaro
    Corchado, Emilio
    Gastaldo, Paolo
    Zunino, Rodolfo
    COMPUTATIONAL AND AMBIENT INTELLIGENCE, 2007, 4507 : 1138 - +
  • [4] Effect of Activation Functions on the Performance of Deep Learning Algorithms for Network Intrusion Detection Systems
    Gupta, Neha
    Bedi, Punam
    Jindal, Vinita
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 949 - 960
  • [5] Comparison of classification techniques applied for network intrusion detection and classification
    Aziz, Amira Sayed A.
    EL-Ola Hanafi, Sanaa
    Hassanien, Aboul Ella
    JOURNAL OF APPLIED LOGIC, 2017, 24 : 109 - 118
  • [6] Comparison of ensemble learning methods applied to network intrusion detection
    Belouch, Mustapha
    El Hadaj, Salah
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [7] Algorithms to speedup pattern matching for network intrusion detection systems
    Zheng, Kai
    Cai, Zhiping
    Zhang, Xin
    Wang, Zhijun
    Yang, Baohua
    COMPUTER COMMUNICATIONS, 2015, 62 : 47 - 58
  • [8] Comparative Analysis of Backpropagation Algorithm Variants for Network Intrusion Detection
    Neupane, Nabin
    Shakya, Subarna
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 726 - 729
  • [9] Intrusion Detection in Computer Networks based on Machine Learning Algorithms
    Osareh, Alireza
    Shadgar, Bita
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 15 - 23
  • [10] Performance Analysis of Network Intrusion Detection Systems using J48 and Naive Bayes Algorithms
    Razdan, Sanjay
    Gupta, Himanshu
    Seth, Ashish
    2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2021,