A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection

被引:65
作者
Chiba, Zouhair [1 ]
Abghour, Noureddine [1 ]
Moussaid, Khalid [1 ]
El Omri, Amina [1 ]
Rida, Mohamed [1 ]
机构
[1] Hassan II Univ Casablanca, Fac Sci, LIMSAD Labs, Casablanca 20100, Morocco
关键词
Network IDS; Back propagation neural network; Anomaly detection; KDD CUP '99 dataset; Feature selection; Data preprocessing; Normalization; Back Propagation Learning; Algorithm; DETECTION SYSTEM; ALGORITHM;
D O I
10.1016/j.cose.2018.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, as attacks against computer networks are evolving rapidly, Network Intrusion Detection System (NIDS) has become a valuable tool for the defense-in-depth of computer networks. It is widely deployed in network architectures in order to monitor, to detect and eventually respond to any anomalous behavior and misuse which can threaten confidentiality, integrity and availability of network resources and services. In this paper, we have proposed an optimal approach to build an effective anomaly NIDS based on Back Propagation Neural Network (BPNN) using Back Propagation Learning Algorithm, and employed a novel architecture for that network. Our approach consists firstly of generation of all possible combinations of most relevant values of the parameters included in construction of such classifier, or influencing its performance in anomaly detection, like feature selection, data normalization, architecture of neural network and activation function. Secondly, we have built 48 IDSs corresponding to those combinations. Finally, after considering all performance measurements like detection rate, false positive rate, F-score, AUC (ability to avoid false classification) etc., we have selected the two best IDSs. Experimental results on KDD CUP '99 dataset indicate that our two best IDSs use the novel architecture, and that compared to several traditional and new techniques, our proposed approach achieves higher detection rate and lower false positive rate. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:36 / 58
页数:23
相关论文
共 57 条
[1]  
Abouabdalla O, 2009, PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, P463, DOI 10.1109/ICBNMT.2009.5348536
[2]  
Aghdam Mehdi Hosseinzadeh, 2016, International Journal of Network Security, V18, P420
[3]   Intrusion Detection System Based on Modified K-means and Multi-level Support Vector Machines [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
SOFT COMPUTING IN DATA SCIENCE, SCDS 2015, 2015, 545 :265-274
[4]  
ALSHDAIFAT B, 2015, J INFORM SECURITY RE, V6, P49
[5]   Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm [J].
Aminanto, Muhamad Erza ;
Kim, HakJu ;
Kim, Kyung-Min ;
Kim, Kwangjo .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) :176-183
[6]  
Anderson JP, 1980, TECHNICAL REPORT, V17
[7]  
[Anonymous], 2014, INT J ENG RES TECHNO
[8]  
[Anonymous], INT J ADV RES COMPUT
[9]  
[Anonymous], 2012, INT J COMPUTER APPL, DOI DOI 10.5120/4823-7074
[10]  
[Anonymous], 2012, Int. J. Eng. Trends Technol