An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks

被引:11
作者
Mohammadi, Shahriar [1 ]
Amiri, Fatemeh [1 ]
机构
[1] KN Toosi Univ Technol, Fac Ind Engn, Tehran, Iran
关键词
Intrusion detection; neural network; self-learner; radial basis function; self-organizing map; CLASSIFICATION; SELECTION; MODEL; SVM;
D O I
10.1142/S1469026819500019
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An intrusion detection system (IDS) is an immunizing system that identifies the hostile activities in a network, and alerts the network administrator in case of detecting suspicious behaviors. Signature-based systems are the most common methods for intrusion detection, but however, they are not able to detect new attacks on the network. The main problem of these systems is to keep up to date the database of already containing known attack signatures. Neural networks have a high ability to learn and are generalizable. This study present as follow: A new intrusion detection system that is a hybrid of self-organizing map algorithm (SOM), radial basis function (RBF) and perceptron networks is proposed to solve this problem. For the first time, The Imperialist Competitive Algorithm is used to calculate the parameters of the Perceptron neural network. The proposed approach uses a hybrid architecture that tries to increase the quality of warnings. Signature-based systems using this method can detect new attacks as a self-learner. The results indicated better performance of the proposed hybrid algorithm compared to earlier methods.
引用
收藏
页数:19
相关论文
共 45 条
[1]  
Almusallam NY, 2017, EMERGENCE COMPLEX CO, V24, P467, DOI 10.1007/978-3-319-46376-6_22
[2]   A Neural Network Ensemble Classifier for Effective Intrusion Detection Using Fuzzy Clustering and Radial Basis Function Networks [J].
Amini, Mohammad ;
Rezaeenour, Jalal ;
Hadavandi, Esmaeil .
INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2016, 25 (02)
[3]  
[Anonymous], ASIAN J INF TECHNOL
[4]  
Baravati HB, 2017, INT J COMPUT SCI NET, V17, P194
[5]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[6]  
Brugger S., 2004, Data mining methods for network intrusion detection
[7]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[8]   A population-based incremental learning approach with artificial immune system for network intrusion detection [J].
Chen, Meng-Hui ;
Chang, Pei-Chann ;
Wu, Jheng-Long .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 51 :171-181
[9]   Selection of Candidate Support Vectors in incremental SVM for network intrusion detection [J].
Chitrakar, Roshan ;
Huang, Chuanhe .
COMPUTERS & SECURITY, 2014, 45 :231-241
[10]   A study on intrusion detection using neural networks trained with evolutionary algorithms [J].
Dash, Tirtharaj .
SOFT COMPUTING, 2017, 21 (10) :2687-2700