A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection

被引:62
|
作者
Chiba, Zouhair [1 ]
Abghour, Noureddine [1 ]
Moussaid, Khalid [1 ]
El Omri, Amina [1 ]
Rida, Mohamed [1 ]
机构
[1] Hassan II Univ Casablanca, Fac Sci, LIMSAD Labs, Casablanca 20100, Morocco
关键词
Network IDS; Back propagation neural network; Anomaly detection; KDD CUP '99 dataset; Feature selection; Data preprocessing; Normalization; Back Propagation Learning; Algorithm; DETECTION SYSTEM; ALGORITHM;
D O I
10.1016/j.cose.2018.01.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, as attacks against computer networks are evolving rapidly, Network Intrusion Detection System (NIDS) has become a valuable tool for the defense-in-depth of computer networks. It is widely deployed in network architectures in order to monitor, to detect and eventually respond to any anomalous behavior and misuse which can threaten confidentiality, integrity and availability of network resources and services. In this paper, we have proposed an optimal approach to build an effective anomaly NIDS based on Back Propagation Neural Network (BPNN) using Back Propagation Learning Algorithm, and employed a novel architecture for that network. Our approach consists firstly of generation of all possible combinations of most relevant values of the parameters included in construction of such classifier, or influencing its performance in anomaly detection, like feature selection, data normalization, architecture of neural network and activation function. Secondly, we have built 48 IDSs corresponding to those combinations. Finally, after considering all performance measurements like detection rate, false positive rate, F-score, AUC (ability to avoid false classification) etc., we have selected the two best IDSs. Experimental results on KDD CUP '99 dataset indicate that our two best IDSs use the novel architecture, and that compared to several traditional and new techniques, our proposed approach achieves higher detection rate and lower false positive rate. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:36 / 58
页数:23
相关论文
共 50 条
  • [21] Gear Fault Detection Analysis Method Based on Fractional Wavelet Transform and Back Propagation Neural Network
    Sun, Yanqiang
    Chen, Hongfang
    Tang, Liang
    Zhang, Shuang
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2019, 121 (03): : 1011 - 1028
  • [22] Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud
    Prabhakaran, Varun
    Kulandasamy, Ashokkumar
    COMPUTATIONAL INTELLIGENCE, 2021, 37 (01) : 344 - 370
  • [23] Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System
    Hussain, Jamal
    Lalmuanawma, Samuel
    RECENT DEVELOPMENTS IN INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, ICCD 2016, 2017, 555 : 73 - 87
  • [24] Enhancing Network Anomaly Detection Using Graph Neural Networks
    Marfo, William
    Tosh, Deepak K.
    Moore, Shirley V.
    2024 22ND MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE, MEDCOMNET 2024, 2024,
  • [25] A Novel Host Intrusion Detection System Using Neural Network
    Lotfallahtabrizi, Parisa
    Morgan, Yasser
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 124 - 130
  • [26] Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network
    Lu, Xue
    Han, Dezhi
    Duan, Letian
    Tian, Qiuting
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 221 - 232
  • [27] Combined Network Intrusion and Phasor Data Anomaly Detection for Secure Dynamic Control Centers
    Kummerow, Andre
    Schaefer, Kevin
    Gupta, Parul
    Nicolai, Steffen
    Bretschneider, Peter
    ENERGIES, 2022, 15 (09)
  • [28] The Use of Artificial Neural Networks in Network Intrusion Detection: A Systematic Review
    Oney, Mehmet Ugur
    Peker, Serhat
    2018 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP), 2018,
  • [29] A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
    Muthunambu, Navaneetha Krishnan
    Prabakaran, Senthil
    Kavin, Balasubramanian Prabhu
    Siruvangur, Kishore Senthil
    Chinnadurai, Kavitha
    Ali, Jehad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 3089 - 3127
  • [30] Using Back-Propagation Neural Network for Automatic Wheezing Detection
    Lin, Bor-Shing
    Jan, Gene Eu
    Wu, Huey-Dong
    Lin, Bor-Shyh
    Chen, Sao-Jie
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 49 - 52