Boosted Modified Probabilistic Neural Network (BMPNN) for network intrusion detection

被引:0
作者
Tran, Tich Phuoc [1 ]
Jan, Tony [1 ]
机构
[1] Univ Technol Sydney, Fac Informat Technol, POB 123, Sydney, NSW 2007, Australia
来源
2006 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORK PROCEEDINGS, VOLS 1-10 | 2006年
关键词
network intrusion detection; artificial neural network; learning bias; generalization variance;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of the currently available network security techniques are not able to cope with the dynamic and increasingly complex nature of the attacks on distributed computer systems. An automated and adaptive defensive tool is imperative for computer networks. One of the emerging solutions for Network Security is the Intrusion Detection System (IDS). However, this technology still faces some challenges such as low detection rates, high false alarm rates and requirement of heavy computational power. To overcome these difficulties, this paper proposes an innovative Machine Learning algorithm called Boosted Modified Probabilistic Neural Network (BMPNN) which utilizes semi-parametric learning model and Adaptive boosting techniques to reduce learning bias and generalization variance in difficult classification. In this paper, BMPNN is implemented as a classifier to detect different types of network anomalies in the KDD-99 benchmark. Extensive experimental outcome indicates that the proposed BMPNN outperforms other state-of-the-art learning algorithms in terms of detection accuracy and model robustness at an affordable computational cost.
引用
收藏
页码:2354 / +
页数:3
相关论文
共 24 条
[1]   A selection criteria for intrusion detection systems [J].
Amoroso, E ;
Kwapniewski, R .
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, :280-288
[2]  
[Anonymous], 2004, INTRUSION DETECTION
[3]  
[Anonymous], P NAT INF SYST SEC C
[4]  
[Anonymous], 2002, ADV INF SECUR
[5]   Analysis of distributed intrusion detection systems using Bayesian methods [J].
Burroughs, DJ ;
Wilson, LF ;
Cybenko, GV .
CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, :329-334
[6]   Adaptive neuro-fuzzy intrusion detection systems [J].
Chavan, S ;
Shah, K ;
Dave, N ;
Mukherjee, S ;
Abraham, A ;
Sanyal, S .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, :70-74
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]  
FREUND Y, 1997, P 13 INT C MACH LEAR, P148
[9]  
Freund Y, 1996, ICML
[10]   NEURAL NETWORKS AND THE BIAS VARIANCE DILEMMA [J].
GEMAN, S ;
BIENENSTOCK, E ;
DOURSAT, R .
NEURAL COMPUTATION, 1992, 4 (01) :1-58