Deep Neural Network Architecture for Anomaly Based Intrusion Detection System

被引:0
作者
Behera, Sidharth [1 ]
Pradhan, Ayush [1 ]
Dash, Ratnakar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela, India
来源
2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) | 2018年
关键词
Deep learning; Convolution; Cross-validation; Attacks; Dropout; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a deep learning neural network for classifying the network traffic data. In this regard convolutional neural network with rectified linear activation function has been employed. The class score is computed at the final fully connected layer using the dropout mechanism. A k fold cross validation has been carried out to validate the model and the value of k is set to 10. NSL-KDD cup 1999 dataset has been used in the experiment to classify between normal state and 4 different attacks. The accuracy of the suggested model for NSL-KDD cup 199 along with another state of the art techniques is presented to show the effectiveness of the suggested model.
引用
收藏
页码:270 / 274
页数:5
相关论文
共 16 条
[11]  
Ryan Jake, 1998, ADV NEURAL INFORM PR
[12]   Hierarchical Kohonenen net for anomaly detection in network security [J].
Sarasamma, ST ;
Zhu, QMA ;
Huff, J .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2005, 35 (02) :302-312
[13]   Decision tree based light weight intrusion detection using a wrapper approach [J].
Sindhu, Siva S. Sivatha ;
Geetha, S. ;
Kannan, A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) :129-141
[14]  
Valdes A., 2001, RECENT ADV INTRUSION
[15]  
Wang Wei, 2006, AV REL SEC 2006 ARES
[16]   Host-based intrusion detection using dynamic and static behavioral models [J].
Yeung, DY ;
Ding, YX .
PATTERN RECOGNITION, 2003, 36 (01) :229-243