Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems

被引:0
|
作者
Ahmad, Iftikhar [1 ,2 ]
Ansari, M. A. [1 ,2 ]
Mohsin, Sajjad [1 ,2 ]
机构
[1] FUUAST, Dept Comp Sci, Islamabad, Pakistan
[2] COMSATS Inst Informat Technol, Islamabad, Pakistan
来源
RECENT ADVANCES IN SYSTEMS, COMMUNICATIONS AND COMPUTERS | 2008年
关键词
intrusion detection; backpropagation; neural networks; IDS (Intrusion Detection System); learning algorithm; dataset;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper a topology of neural network intrusion detection system is proposed on which different backpropagation algorithms are benchmarked. The proposed methodology uses sampled data from KddCup99 data set, an intrusion detection attacks database that is a standard for the evaluation of intrusion detection systems. The performance of backpropagation algorithms implemented in batch mode, is addressed. A comparative analysis of algorithms is made and then the most optimum solution is selected with respect to mean square error.
引用
收藏
页码:47 / +
页数:2
相关论文
共 50 条
  • [21] A rough set theory based method for anomaly intrusion detection in computer network systems
    Cai, ZM
    Guan, XH
    Shao, P
    Peng, QK
    Sun, GJ
    EXPERT SYSTEMS, 2003, 20 (05) : 251 - 259
  • [22] Performance comparison of neural network models:: Backpropagation vs. fuzzy artmap
    Kim, D
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2001, 78 (03) : 365 - 382
  • [23] Comparison and evaluation of pattern matching algorithms for intrusion detection
    Sapats, Martins
    Paulins, Nauris
    AICT 2013: APPLIED INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013, : 36 - 42
  • [24] A decisional framework system for computer network intrusion detection
    Fessi, B. A.
    Hamdi, M.
    Benabdallah, S.
    Boudriga, N.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 177 (03) : 1824 - 1838
  • [25] Comparison results between usual backpropagation and modified backpropagation with weighting: Application to radar detection
    Andina, Diego
    Jevtic, Aleksandar
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEMS, VOL 2: SYSTEMS THEORY AND APPLICATIONS, 2007, : 243 - +
  • [26] Artificial Neural Network Classifier for Intrusion Detection System in Computer Network
    Lokeswari, N.
    Rao, B. Chakradhar
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 581 - 591
  • [27] Realistic Computer Network Simulation for Network Intrusion Detection Dataset Generation
    Payer, Garrett
    NEXT-GENERATION ROBOTICS II; AND MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS IX, 2015, 9494
  • [28] Performance comparison of intrusion detection systems and application of machine learning to Snort system
    Shah, Syed Ali Raza
    Issac, Biju
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 157 - 170
  • [29] Comparison of Particle Swarm Optimization and Backpropagation Algorithms for Training Feedforward Neural Network
    Mohammadi, Nasser
    Mirabedini, Seyed Javad
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2014, 12 (02): : 113 - 123
  • [30] Alarm clustering for intrusion detection systems in computer networks
    Perdisci, Roberto
    Giacinto, Giorgio
    Roli, Fabio
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2006, 19 (04) : 429 - 438