PERFORMANCE COMPARISON FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK WITH KDD DATASET

Intrusion Detection Systems are challenging task for finding the user as normal user or attack user in any organizational information systems or IT Industry. The Intrusion Detection System is an effective method to deal with the kinds of problem in networks. Different classifiers are used to detect the different kinds of attacks in networks. In this paper, the performance of intrusion detection is compared with various neural network classifiers. In the proposed research the four types of classifiers used are Feed Forward Neural Network (FFNN), Generalized Regression Neural Network (GRNN), Probabilistic Neural Network (PNN) and Radial Basis Neural Network (RBNN). The performance of the full featured KDD Cup 1999 dataset is compared with that of the reduced featured KDD Cup 1999 dataset. The MATLAB software is used to train and test the dataset and the efficiency and False Alarm Rate is measured. It is proved that the reduced dataset is performing better than the full featured dataset.

[1]  Qiang Chen,et al.  Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.

[2]  S. Selvan,et al.  Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network , 2007 .

[3]  Srinivasan Ramakrishnan,et al.  Classification brain MR images through a fuzzy multiwavelets based GMM and probabilistic neural networks , 2011, Telecommun. Syst..

[4]  Hua Jiang,et al.  The Application of Genetic Neural Network in Network Intrusion Detection , 2009, J. Comput..

[5]  Kotagiri Ramamohanarao,et al.  Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.

[6]  S. Devaraju,et al.  PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW , 2013 .

[7]  Xinghuo Yu,et al.  A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection , 2009, IEEE Network.

[8]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .

[9]  Amutha Prabakar Muniyandi,et al.  Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .

[10]  S. Ramakrishnan On the Application of Various Probabilistic Neural Networks in Solving Different Pattern Classification Problems , 2008 .

[11]  Shun-Zheng Yu,et al.  A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors , 2009, TNET.

[12]  Mansour Sheikhan,et al.  Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.

[13]  Neveen I. Ghali,et al.  Feature Selection for Effective Anomaly-Based Intrusion Detection , 2009 .

[14]  S. Devaraju,et al.  Performance analysis of intrusion detection system using various neural network classifiers , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[15]  Allam Appa Rao,et al.  A PROBABILISTIC NEURAL NETWORK APPROACH FOR PROTEIN SUPERFAMILY CLASSIFICATION , 2009 .

[16]  S. T. Sarasamma,et al.  Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[17]  Ning Chen,et al.  An Anomaly Detection and Analysis Method for Network Traffic Based on Correlation Coefficient Matrix , 2009, 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing.