Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism

被引:0
作者
Sun, Ning-Qing [1 ]
Li, Yang [1 ]
机构
[1] Guangxi Vocat & Tech Inst Ind, Nanning 230001, Peoples R China
来源
FUTURE GENERATION INFORMATION TECHNOLOGY, PROCEEDINGS | 2009年 / 5899卷
关键词
Intrusion detection; neural network; feature selection; independent component analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection is a critical component of secure information systems. Current intrusion detection systems (IDS) especially NIDS (Network Intrusion Detection System) examine all data features to detect intrusions. However, some of the features may be redundant or contribute little to the detection process and therefore they have an unnecessary negative impact on the system performance. This paper proposes a lightweight intrusion detection model that is computationally efficient and effective based on feature selection and back-propagation neural network (BPNN). Firstly, the issue of identifying important input features based on independent component analysis (ICA) is addressed, because elimination of the insignificant and/or useless inputs leads to a simplification of the problem, therefore results in faster and more accurate detection. Secondly, classic BPNN is used to learn and detect intrusions using the selected important features. Experimental results on the well-known KDD Cup 1999 dataset demonstrate the proposed model is effective and can further improve the performance by reducing the computational cost without obvious deterioration of detection performances.
引用
收藏
页码:151 / 159
页数:9
相关论文
共 12 条
  • [1] Brutlag JD, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P139
  • [2] Chen Y, 2006, LECT NOTES COMPUT SC, V4318, P153
  • [3] Building lightweight intrusion detection system based on principal component analysis and C4.5 algorithm
    Chen, You
    Dai, Lei
    Li, Yang
    Cheng, Xue-Qi
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2109 - +
  • [4] DAGUPTA D, 2002, IEEE T EVOLUTIONARY, V6, P28
  • [5] Hecht-Nielsen R., 1989, IJCNN: International Joint Conference on Neural Networks (Cat. No.89CH2765-6), P593, DOI 10.1109/IJCNN.1989.118638
  • [6] Hyvaerinen A., 2001, INDEPENDENT COMPONEN
  • [7] Stateful intrusion detection for high-speed networks
    Kruegel, C
    Valeur, F
    Vigna, G
    Kemmerer, R
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 285 - 293
  • [8] Li Y., 2006, Communication Technology, P1, DOI DOI 10.1109/ICR.2006.343404
  • [9] Prasad M, 2004, PROCEEDINGS OF THE 2004 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, P427
  • [10] ROESCH M, 1999, P 13 SYST ADM C LISA