Cascaded hybrid intrusion detection model based on SOM and RBF neural networks

被引:7
作者
Almiani, Muder [1 ]
AbuGhazleh, Alia [2 ]
Al-Rahayfeh, Amer [3 ]
Razaque, Abdul [4 ]
机构
[1] Al Hussein Bin Talal Univ, Dept Comp Informat Syst, Maan 71111, Jordan
[2] Univ Jordan, Amman 1194213375, Jordan
[3] Al Hussein Bin Talal Univ, Dept Comp Sci, Maan, Jordan
[4] New York Inst Technol, Dept Comp Sci, New York, NY USA
关键词
Hybrid intrusion detection; intrusion detection; K‐ means; neural networks; radial basis function; self‐ organized map;
D O I
10.1002/cpe.5233
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cybercriminal activities over computer network systems are considered one of the preponderant issues that humanity will face in the coming two decades. The development steps in the design of intrusion detection systems must be carried out in analogous manner to sophistication levels of intrusions developed by hackers. This work proposes a layered hybrid intrusion detection model uses cascaded layers of Clustered Self-Organized Map (CSOM) and Radial Basis Function (RBF) neural networks to improve the efficiency of detecting frequent and least frequent intrusions. K-means clustered SOM was used to filter attacks as a first layer, whereas RBF-based neural network worked as second filtering and attacked classification layer leading to significance reduction in time required to process connection records and notable improvements in the performance of intrusion detection. A new balanced version of cleansed NSL-KDD dataset was used to validate and evaluate the proposed model. Compared with other existing schemes; the proposed model shows high detection performance in terms of accuracy 97.73% and false positive rate as low as 0.023%. In particular, for detecting least and most harmful attacks, U2R and R2L, the system achieved detection rate of 88.6% with false positive rate of 0.016. Comparative results showed that CSOM-RBF model is more suitable for real-life implementation than other many existing state-of-the-art intrusion detection models.
引用
收藏
页数:14
相关论文
共 55 条
[1]   A parallel genetic local search algorithm for intrusion detection in computer networks [J].
Abadeh, Mohammad Saniee ;
Habibi, Jafar ;
Barzegar, Zeynab ;
Sergi, Muna .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (08) :1058-1069
[2]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[3]  
Almi'ani M, 2018, 2018 FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P138, DOI 10.1109/SDS.2018.8370435
[4]  
Alom MZ, 2017, PROC NAECON IEEE NAT, P63, DOI 10.1109/NAECON.2017.8268746
[5]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[6]  
[Anonymous], 2018, SOM TOOLB PACK 20
[7]  
Aravind MAM, 2017, 2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN)
[8]  
Bakour K, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P215, DOI 10.1109/UBMK.2017.8093378
[9]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[10]  
Braz J, 2016, 2 INT C PERS TECHN, V598