Deep Neural Network Architecture for Anomaly Based Intrusion Detection System

被引:0
作者
Behera, Sidharth [1 ]
Pradhan, Ayush [1 ]
Dash, Ratnakar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela, India
来源
2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) | 2018年
关键词
Deep learning; Convolution; Cross-validation; Attacks; Dropout; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a deep learning neural network for classifying the network traffic data. In this regard convolutional neural network with rectified linear activation function has been employed. The class score is computed at the final fully connected layer using the dropout mechanism. A k fold cross validation has been carried out to validate the model and the value of k is set to 10. NSL-KDD cup 1999 dataset has been used in the experiment to classify between normal state and 4 different attacks. The accuracy of the suggested model for NSL-KDD cup 199 along with another state of the art techniques is presented to show the effectiveness of the suggested model.
引用
收藏
页码:270 / 274
页数:5
相关论文
共 16 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]  
Aneetha A., 2012, The combined approach for anomaly detection using neural networks and clustering techniques, V2, P37, DOI 10.5121/cseij.2012.2404
[3]  
[Anonymous], 2009, 2009 IEEE S COMP INT
[4]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[5]   A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems [J].
Eesa, Adel Sabry ;
Orman, Zeynep ;
Brifcani, Adnan Mohsin Abdulazeez .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) :2670-2679
[6]   Mining network data for intrusion detection through combining SVMs with ant colony networks [J].
Feng, Wenying ;
Zhang, Qinglei ;
Hu, Gongzhu ;
Huang, Jimmy Xiangji .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :127-140
[7]  
Javaid A., 2016, P 9 EAI INT C BIO IN, V3, pe2
[8]   Training a neural-network based intrusion detector to recognize novel attacks [J].
Lee, SC ;
Heinbuch, DV .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04) :294-299
[9]   Use of K-Nearest Neighbor classifier for intrusion detection [J].
Liao, YH ;
Vemuri, VR .
COMPUTERS & SECURITY, 2002, 21 (05) :439-448
[10]   An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming [J].
Mabu, Shingo ;
Chen, Ci ;
Lu, Nannan ;
Shimada, Kaoru ;
Hirasawa, Kotaro .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2011, 41 (01) :130-139