A Neural Network-Based Learning Algorithm for Intrusion Detection Systems

Recently, intrusion detection systems (IDS) have been introduced to effectively secure networks. Using neural networks and machine learning in detecting and classifying intrusions are powerful alternative solutions. In this research paper, both of Gradient descent with momentum (GDM)-based back-propagation (BP) and Gradient descent with momentum and adaptive gain (GDM/AG)-based BP algorithms are utilized for training neural networks to operate like IDS. To investigate the efficiency of the two proposed learning schemes, a neural network based IDS is built using the proposed learning algorithms. The efficiency of both algorithms is inspected in terms of convergence speed to achieve system learning, and elapsed learning time using various settings of neural network parameters. The result demonstrated that the GDM/AG-based BP learning algorithm outperforms the GDM-based BP learning algorithm.

[1]  Xiangliang Zhang,et al.  Constructing attribute weights from computer audit data for effective intrusion detection , 2009, J. Syst. Softw..

[2]  Li-Yong Ren,et al.  Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[3]  Philippe Owezarski,et al.  Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge , 2012, Comput. Commun..

[4]  Zhifeng Chen,et al.  Application of PSO-RBF Neural Network in Network Intrusion Detection , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.

[5]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[6]  D. S. Yeung,et al.  Network intrusion detection in covariance feature space , 2007, Pattern Recognit..

[7]  Abdulkader A. Alfantookh,et al.  DoS Attacks Intelligent Detection using Neural Networks , 2006, J. King Saud Univ. Comput. Inf. Sci..

[8]  Reza Sabzevari,et al.  Improvement of learning algorithms for RBF neural networks in a helicopter sound identification system , 2007, Neurocomputing.

[9]  M. Shyu,et al.  A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .

[10]  Andrew J. Clark,et al.  Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..

[11]  V N Dao,et al.  Performance of Neural Networks Methods In Intrusion Detection , 2001 .

[12]  Balaraman Ravindran,et al.  Adaptive network intrusion detection system using a hybrid approach , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[13]  Walter D. Potter,et al.  LIDS: Learning Intrusion Detection System , 2003, FLAIRS.

[14]  Zhi-Hua Hu,et al.  An Incremental SVM for Intrusion Detection Based on Key Feature Selection , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.

[15]  A.H. Sung,et al.  Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..

[16]  Alpa Reshamwala,et al.  A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique , 2012 .

[17]  Shikha Agrawal,et al.  A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques , 2013 .

[18]  Rung Ching Chen,et al.  Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.

[19]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[20]  Hu Zhengbing,et al.  An Intelligent Lightweight Intrusion Detection System with Forensics Technique , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[21]  Lei Li,et al.  A novel rule-based Intrusion Detection System using data mining , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[22]  Zehua Chen,et al.  An adaptive real-time intrusion detection system using sequences of system call , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[23]  Chunhua Gu,et al.  A Rough Set and SVM Based Intrusion Detection Classifier , 2009, 2009 Second International Workshop on Computer Science and Engineering.

[24]  M. Hemalatha,et al.  Effective approach toward Intrusion Detection System using data mining techniques , 2014 .

[25]  Ruzhi Xu,et al.  Research intrusion detection based PSO-RBF classifier , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.

[26]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[27]  Susan C. Lee,et al.  Training a neural-network based intrusion detector to recognize novel attacks , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[28]  Hari Om,et al.  STATISTICAL TECHNIQUES IN ANOMALY INTRUSION DETECTION SYSTEM , 2012 .

[29]  Ashraf Darwish,et al.  Principle components analysis and Support Vector Machine based Intrusion Detection System , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.

[30]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[31]  Osama S. Faragallah,et al.  Divided two-part adaptive intrusion detection system , 2012, Wireless Networks.

[32]  Andrew H. Sung,et al.  Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[33]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[34]  Miyoung Shin Shin,et al.  A Radial Basis Function Approach to Pattern Recognition and Its Applications , 2000 .

[35]  Lilly Suriani Affendey,et al.  Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).

[36]  Rozaida Ghazali,et al.  An Improved Back Propagation Neural Network Algorithm on Classification Problems , 2010, FGIT-DTA/BSBT.

[37]  A. Piskozub,et al.  Real-Time Intrusion Prevention and Anomaly Analyze System for Corporate Networks , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[38]  Qiang Chen,et al.  An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems , 2001 .

[39]  Hu Zhengbing,et al.  A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining , 2008, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008).

[40]  Nazri Mohd Nawi,et al.  An Improved Conjugate Gradient Based Learning Algorithm for Back Propagation Neural Networks , 2008 .

[41]  Karen Scarfone,et al.  Intrusion Detection and Prevention Systems , 2010, Handbook of Information and Communication Security.