Evolving Neural Network Intrusion Detection System for MCPS

被引:0
作者
Mowla, Nishat [1 ,3 ]
Doh, Inshil [2 ,3 ]
Chae, KiJoon [1 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, 52 Ewhayeodae Gil, Seoul 120750, South Korea
[2] Ewha Womans Univ, Dept Cyher Secur, 52 Ewhayeodae Gil, Seoul 120750, South Korea
[3] Ewha Womans Univ, Seoul 120750, South Korea
来源
2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT) | 2018年
基金
新加坡国家研究基金会;
关键词
MCPS; Machine Learning; Neural Networks; Intrusion Detection System;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Medical Cyber Physical Systems (MCPS) are some of the most promising next generation technologies so far. Like many other systems connected to a wider network such as internet, MCPS are also vulnerable to various forms of network attacks. For detecting such diverse forms of attack, we need smart and efficient mechanisms. Human intelligence is good enough to track such attacks but when it is a huge number of traffic it is no more a feasible process to detect them manually as it is time consuming and computationally intensive. Machine learning techniques embracing artificial intelligence are emerging as powerful tools to detect abnormalities in the network data. Supervised Neural Networks are some of the most efficient techniques to perform such classification. In this paper, we propose an evolving neural network technique that evolves based on classification, elimination and prioritization while focusing on time, space and accuracy to efficiently classify the four major types of network attack traffic found in an effectively pruned KDD dataset. We also show a leap of performance with hyper-parameter optimization which highly enhances the benefit of our proposed mechanism. Finally, the new performance gain is compared with a boosted Decision Tree. We believe our proposed mechanism can be adopted to new forms of attack categories and sub-categories.
引用
收藏
页码:1040 / 1045
页数:6
相关论文
共 16 条
[1]   Realistic Simulation for Body Area and Body-To-Body Networks [J].
Alam, Muhammad Mahtab ;
Ben Hamida, Elyes ;
Ben Arbia, Dhafer ;
Maman, Mickael ;
Mani, Francesco ;
Denis, Benoit ;
D'Errico, Raffaele .
SENSORS, 2016, 16 (04)
[2]  
[Anonymous], 2015, INT J SECUR APPL, DOI DOI 10.14257/IJSIA.2015.9.4.23
[3]  
[Anonymous], 2016, Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on, DOI 10.1109/ETFA.2016.7733515
[4]  
[Anonymous], 2015, Int. J. Adv. Res. Comput. Commun. Eng.
[5]  
[Anonymous], 2013, INT J COMPUTER APPL
[6]  
[Anonymous], SRI INT MAY
[7]  
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P118
[8]  
Kocabas O., 2016, IEEE ACM T COMPUTATI, V13
[9]  
Liberios V OKOROKOS., 2006, Acta Electrotechnica et Informatica, V6, P1
[10]   A memory-efficient parallel string matching architecture for high-speed intrusion detection [J].
Lu, Hongbin ;
Zheng, Kai ;
Liu, Bin ;
Zhang, Xin ;
Liu, Yunhao .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) :1793-1804