Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems

被引:0
作者
Ahmad, Iftikhar [1 ,2 ]
Ansari, M. A. [1 ,2 ]
Mohsin, Sajjad [1 ,2 ]
机构
[1] FUUAST, Dept Comp Sci, Islamabad, Pakistan
[2] COMSATS Inst Informat Technol, Islamabad, Pakistan
来源
RECENT ADVANCES IN SYSTEMS, COMMUNICATIONS AND COMPUTERS | 2008年
关键词
intrusion detection; backpropagation; neural networks; IDS (Intrusion Detection System); learning algorithm; dataset;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper a topology of neural network intrusion detection system is proposed on which different backpropagation algorithms are benchmarked. The proposed methodology uses sampled data from KddCup99 data set, an intrusion detection attacks database that is a standard for the evaluation of intrusion detection systems. The performance of backpropagation algorithms implemented in batch mode, is addressed. A comparative analysis of algorithms is made and then the most optimum solution is selected with respect to mean square error.
引用
收藏
页码:47 / +
页数:2
相关论文
共 50 条
  • [31] Alarm clustering for intrusion detection systems in computer networks
    Giacinto, G
    Perdisci, R
    Roli, F
    MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2005, 3587 : 184 - 193
  • [32] Alarm clustering for intrusion detection systems in computer networks
    Perdisci, Roberto
    Giacinto, Giorgio
    Roli, Fabio
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2006, 19 (04) : 429 - 438
  • [33] Anonymized Network Monitoring for Intrusion Detection Systems
    Srinivas, D. B.
    Mohan, Sagar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (07): : 191 - 198
  • [34] Multiagent Systems for Network Intrusion Detection: A Review
    Herrero, Alvaro
    Corchado, Emilio
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2009, 63 : 143 - 154
  • [35] Applied Research on Data Mining Algorithm in Network Intrusion Detection
    Xue, Ming
    Zhu, Changjun
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 275 - +
  • [36] Network Intrusion Detection Using Danger Theory and Genetic Algorithms
    Santanelli, Joao Lima
    de Lima Neto, Fernando Buarque
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 394 - 405
  • [37] Design of intrusion detection system oriented to computer network security
    Lou, Xiao
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 258 - 262
  • [38] A Novel Random Neural Network Based Approach for Intrusion Detection Systems
    Qureshi, Ayyaz-Ul-Haq
    Larijani, Hadi
    Ahmad, Jawad
    Mtetwa, Nhamoinesu
    2018 10TH COMPUTER SCIENCE AND ELECTRONIC ENGINEERING CONFERENCE (CEEC), 2018, : 50 - 55
  • [39] A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network
    Dang, Khoa Dinh Nguyen
    Fazio, Peppino
    Voznak, Miroslav
    FUTURE INTERNET, 2024, 16 (08)
  • [40] A novel outlier detection scheme for network intrusion detection systems
    Prakobphol, Komsit
    Zhan, Justin
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 555 - 560