Network Attack Detection Based on Combination of Neural, Immune and Neuro-Fuzzy Classifiers

The paper considers an approach for detection of anomalous patterns of network connections using artificial neural networks, immune systems, neuro-fuzzy classifiers and their combination. The principal component analysis is proposed to optimize the assigned problem. The architecture of the intrusion detection system, based on the application of the proposed methods, is described. The main advantage of the developed approach to intrusion detection is a multi-level analysis technique: first, signature based analysis is carried out, then a combination of adaptive detectors is involved. A number of computational experiments is performed. These experiments demonstrate the effectiveness of the chosen methods in terms of false positive, true positive and correct classification rates.

[1]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[2]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[3]  Philip K. Chan,et al.  Meta-learning in distributed data mining systems: Issues and approaches , 2007 .

[4]  Mohamed S. Kamel,et al.  RBF-based real-time hierarchical intrusion detection systems , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[5]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[6]  K. Tan,et al.  The application of neural networks to UNIX computer security , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.

[7]  Jun He,et al.  A hybrid artificial immune system and Self Organising Map for network intrusion detection , 2008, Inf. Sci..

[8]  J.D.S. da Silva,et al.  A neural network application for attack detection in computer networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[9]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[10]  Ali A. Ghorbani,et al.  Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.

[11]  Ali A. Ghorbani,et al.  Network intrusion detection using an improved competitive learning neural network , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[12]  Gary B. Wills,et al.  Application of Bagging, Boosting and Stacking to Intrusion Detection , 2012, MLDM.

[13]  M. Govindarajan Intrusion Detection using an Ensemble of Classification Methods , 2012 .

[14]  Adel Nadjaran Toosi,et al.  A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..

[15]  Christopher J. Merz,et al.  Combining Classifiers Using Correspondence Analysis , 1997, NIPS.

[16]  Vladimir Golovko,et al.  Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors , 2009 .

[17]  Reza Azmi,et al.  STLR: a novel danger theory based structural TLR algorithm , 2013, ISC Int. J. Inf. Secur..

[18]  Siti Mariyam Shamsuddin,et al.  Ensemble classifiers for network intrusion detection system , 2009 .

[19]  Andrew H. Sung,et al.  Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.

[20]  Ahmad Habibizad Navin,et al.  Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems , 2012 .

[21]  Vladimir A. Golovko,et al.  Development of neural network immune detectors for computer attacks recognition and classification , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[22]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[23]  Ajith Abraham,et al.  Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .

[24]  Kimmo Hätönen,et al.  A computer host-based user anomaly detection system using the self-organizing map , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[25]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[26]  Andrew H. Sung,et al.  Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..

[27]  R. Monsefi,et al.  Network intrusion detection based on neuro-fuzzy classification , 2006, 2006 International Conference on Computing & Informatics.

[28]  Xiangliang Zhang,et al.  Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..