Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems

被引:0
作者
Ahmad, Iftikhar [1 ,2 ]
Ansari, M. A. [1 ,2 ]
Mohsin, Sajjad [1 ,2 ]
机构
[1] FUUAST, Dept Comp Sci, Islamabad, Pakistan
[2] COMSATS Inst Informat Technol, Islamabad, Pakistan
来源
RECENT ADVANCES IN SYSTEMS, COMMUNICATIONS AND COMPUTERS | 2008年
关键词
intrusion detection; backpropagation; neural networks; IDS (Intrusion Detection System); learning algorithm; dataset;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper a topology of neural network intrusion detection system is proposed on which different backpropagation algorithms are benchmarked. The proposed methodology uses sampled data from KddCup99 data set, an intrusion detection attacks database that is a standard for the evaluation of intrusion detection systems. The performance of backpropagation algorithms implemented in batch mode, is addressed. A comparative analysis of algorithms is made and then the most optimum solution is selected with respect to mean square error.
引用
收藏
页码:47 / +
页数:2
相关论文
共 50 条
  • [41] Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems
    Mulyanto, Mulyanto
    Faisal, Muhamad
    Prakosa, Setya Widyawan
    Leu, Jenq-Shiou
    [J]. SYMMETRY-BASEL, 2021, 13 (01): : 1 - 16
  • [42] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123
  • [43] A REVIEW OF HUMAN IMMUNE INSPIRED ALGORITHMS FOR INTRUSION DETECTION SYSTEMS
    Duru, Chukwuemeka
    Ladeji-Osias, Jumoke
    Wandji, Ketchiozo
    Otily, Toutsop
    Kone, Rachida
    [J]. 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 364 - 371
  • [44] Performance analysis of machine learning algorithms for intrusion detection in MANETs
    [J]. Jiang, Y. (jyb106@zjut.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06): : 501 - 507
  • [45] Evaluation and Comparison of Classification Techniques for Network Intrusion Detection
    Giray, Sait Murat
    Polat, Aydin Goze
    [J]. 2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 335 - 342
  • [46] Improving the Computer Network Intrusion Detection Performance Using the Relevance Vector Machine with Chebyshev Chaotic Map
    He, Di
    [J]. 2011 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2011, : 1584 - 1587
  • [47] Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
    Gorodetski, V
    Kotenko, I
    Karsaev, O
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (04): : 191 - 200
  • [48] Intrusion detection and prevention systems in industrial IoT network
    Sharma, Sangeeta
    Kumar, Ashish
    Rathore, Navdeep Singh
    Sharma, Shivanshu
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [49] Study of Neural Network Technologies in Intrusion Detection Systems
    Fu Yanwei
    Zhu Yingying
    Yu Haiyang
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4454 - +
  • [50] Network intrusion detection using oversampling technique and machine learning algorithms
    Ahmed, Hafiza Anisa
    Hameed, Anum
    Bawany, Narmeen Zakaria
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8 : 1 - 19