Network intrusion detection system using supervised learning paradigm

被引:51
作者
Mebawondu, J. Olamantanmi [1 ]
Alowolodu, Olufunso D. [2 ]
Mebawondu, Jacob O. [1 ]
Adetunmbi, Adebayo O. [3 ]
机构
[1] Fed Polytech, Dept Comp Sci, Nasarawa, Nigeria
[2] Fed Univ Technol Akure, Dept CyberSecur, Akure, Nigeria
[3] Fed Univ Technol Akure, Dept Comp Sci, Akure, Nigeria
关键词
Artificial neural network; Multi-layer perceptron; Gain ratio; Accuracy; UNSW-NB15; dataset;
D O I
10.1016/j.sciaf.2020.e00497
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Internet has positively changed social, political and economic structures and in many ways obviating geographical boundaries. The enormous contributions of Internet to business transactions coupled with its ease of use has resulted in increased number of internet users and consequently, intruders. It is crucial to safeguard computer resources with the aid of Intrusion Detection Systems (IDS) in addition to Intrusion Prevention Systems. In recent times, enormous network traffic generated in terabytes within couples of seconds are difficult to analyze with the traditional rule-based approach; hence, researchers have to subject data mining techniques to intrusion detection with emphasis on intrusion detection accuracy; relevant feature selection leads to faster and enhanced accurate detection rate. Therefore, this paper presents a light weight IDS based on information gain and Multi-layer perceptron Neural Network. Gain ratio was used in selecting relevant features for attack and normal traffic prior classification using Neural Network. Empirical results from the UNSW-NB15 intrusion detection dataset on thirty selected attributes is a highly ranked decision, thus, the light weight IDS is suitable for real time intrusion detection. (C) 2020 The Author(s). Published by Elsevier B.V. on behalf of African Institute of Mathematical Sciences / Next Einstein Initiative.
引用
收藏
页数:11
相关论文
共 20 条
[1]  
Adetunmbi, 2008, THESIS FEDERAL U TEC
[2]  
Adetunmbi A. O., 2007, J COMPUTER SCI ITS A, V14, P24
[3]  
AlSallal M, 2017, INTEGRATED APPROACH
[4]   On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks [J].
Boppana, Rajendra V. ;
Su, Xu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) :1162-1174
[5]   TESTING OF IDS MODEL USING SEVERAL INTRUSION DETECTION TOOLS [J].
Ennert, Michal ;
Chovancova, Eva ;
Dudlakova, Zuzana .
JOURNAL OF APPLIED MATHEMATICS AND COMPUTATIONAL MECHANICS, 2015, 14 (01) :55-62
[6]  
Garg N., 2013, INT J COMPUT APPL, V71, P8887
[7]   Detecting adversarial examples via prediction difference for deep neural networks [J].
Guo, Feng ;
Zhao, Qingjie ;
Li, Xuan ;
Kuang, Xiaohui ;
Zhang, Jianwei ;
Han, Yahong ;
Tan, Yu-an .
INFORMATION SCIENCES, 2019, 501 :182-192
[8]  
Mahoney Philip, 2003, RECENT ADV INTRUSION
[9]  
Mebawondu J., 2018, DEV NETWORK INTRUSIO
[10]  
Mebawondu J.O., 2012, CONTINENTAL J INFORM, V6, P1, DOI [10.5707/cjit.2012.6.1.1.15, DOI 10.5707/CJIT.2012.6.1.1.15]