INTRUSION DETECTION BY BACKPROPAGATION NEURAL NETWORKS WITH SAMPLE-QUERY AND ATTRIBUTE-QUERY

The growing network intrusions have put companies and organizations at a much greater risk of loss. In this paper, we propose a new learning methodology towards developing a novel intrusion detection system (IDS) by backpropagation neural networks (BPN) with sample-query and attribute-query. We test the proposed method by a benchmark intrusion dataset to verify its feasibility and effectiveness. Results show that choosing good attributes and samples will not only have impact on the performance, but also on the overall execution efficiency. The proposed method can significantly reduce the training time required. Additionally, the training results are good. It provides a powerful tool to help supervisors analyze, model and understand the complex attack behavior of electronic crime.

[1]  Leslie G. Valiant,et al.  A theory of the learnable , 1984, STOC '84.

[2]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.

[3]  Hervé Debar,et al.  An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.

[4]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[5]  Ray-I Chang Disease Diagnosis Using Query-Based Neural Networks , 2005, ISNN.

[6]  Tim Oates,et al.  The Effects of Training Set Size on Decision Tree Complexity , 1997, ICML.

[7]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[8]  Li Jun,et al.  HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .

[9]  Jenq-Neng Hwang,et al.  Query-based learning applied to partially trained multilayer perceptrons , 1991, IEEE Trans. Neural Networks.

[10]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Pei-Yung Hsiao,et al.  Unsupervised query-based learning of neural networks using selective-attention and self-regulation , 1997, IEEE Trans. Neural Networks.

[12]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .