Intrusion detection using reduced-size RNN based on feature grouping

被引:1
作者
Mansour Sheikhan
Zahra Jadidi
Ali Farrokhi
机构
[1] Islamic Azad University,Department of Communication Engineering, Faculty of Engineering
[2] South Tehran Branch,Department of Electronic Engineering
[3] Islamic Azad University,undefined
[4] South Tehran Branch,undefined
来源
Neural Computing and Applications | 2012年 / 21卷
关键词
Partial connection; Recurrent neural network; Intrusion detection; Feature grouping;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection is well-known as an essential component to secure the systems in Information and Communication Technology (ICT). Based on the type of analyzing events, two kinds of Intrusion Detection Systems (IDS) have been proposed: anomaly-based and misuse-based. In this paper, three-layer Recurrent Neural Network (RNN) architecture with categorized features as inputs and attack types as outputs of RNN is proposed as misuse-based IDS. The input features are categorized to basic features, content features, time-based traffic features, and host-based traffic features. The attack types are classified to Denial-of-Service (DoS), Probe, Remote-to-Local (R2L), and User-to-Root (U2R). For this purpose, in this study, we use the 41 features per connection defined by International Knowledge Discovery and Data mining group (KDD). The RNN has an extra output which corresponds to normal class (no attack). The connections between the nodes of two hidden layers of RNN are considered partial. Experimental results show that the proposed model is able to improve classification rate, particularly in R2L attacks. This method also offers better Detection Rate (DR) and Cost Per Example (CPE) when compared to similar related works and also the simulated Multi-Layer Perceptron (MLP) and Elman-based intrusion detectors. On the other hand, False Alarm Rate (FAR) of the proposed model is not degraded significantly when compared to some recent machine learning methods.
引用
收藏
页码:1185 / 1190
页数:5
相关论文
共 50 条
  • [31] A Network Intrusion Detection System Based On Ensemble CVM Using Efficient Feature Selection Approach
    Divyasree, T. H.
    Sherly, K. K.
    8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 442 - 449
  • [32] Convolutional neural network models using metaheuristic based feature selection method for intrusion detection
    Salati, Maryam
    Askerzade, Iman
    Bostanci, Gazi Erkan
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2024, 40 (01): : 179 - 188
  • [33] An Effective Semi-supervised Model for Intrusion Detection Using Feature Selection Based LapSVM
    Zhang, Xiaofeng
    Tian, Jianwei
    Zhu, Peidong
    Zhang, Jiexin
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS), 2017, : 284 - 287
  • [34] Machine learning-based intrusion detection: feature selection versus feature extraction
    Ngo, Vu-Duc
    Vuong, Tuan-Cuong
    Van Luong, Thien
    Tran, Hung
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2365 - 2379
  • [35] Feature Grouping-Based Outlier Detection Upon Streaming Trajectories
    Mao, Jiali
    Wang, Tao
    Jin, Cheqing
    Zhou, Aoying
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2017, 29 (12) : 2696 - 2709
  • [36] Intrusion detection using decision tree classifier with feature reduction technique
    Raza, Syed Atir
    Shamim, Sania
    Khan, Abdul Hannan
    Anwar, Aqsa
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2023, 42 (02) : 30 - 37
  • [37] Hybrid optimization scheme for intrusion detection using considerable feature selection
    Velliangiri, S.
    Karthikeyan, P.
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (12) : 7925 - 7939
  • [38] Hybrid optimization scheme for intrusion detection using considerable feature selection
    S. Velliangiri
    P. Karthikeyan
    Neural Computing and Applications, 2020, 32 : 7925 - 7939
  • [39] Optimal feature selection in intrusion detection using SVM-CA
    Sugi S.S.S.
    Ratna S.R.
    International Journal of Networking and Virtual Organisations, 2021, 25 (02) : 103 - 113
  • [40] An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application
    Xie, Xin
    Jiang, Xunyi
    Wang, Weiru
    Wang, Bin
    Wan, Tiancheng
    Yang, Hao
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 13 - 20