Parallel Deep Neural Network for Detecting Computer Attacks in Information Telecommunication Systems

The approach to parallelization of the deep neural network by dividing the training set into sub-set and training each sub-set into a separate copy of the model of the neural network, which allows to significantly reduce the training time and increase the reliability of the detection of attacks, is proposed. The structure of the neural network in the framework Caffe is developed, and experimental studies have been carried out that showed an increase in the reliability of the detection of attacks in comparison with known approaches.

[1]  Xue-wen Chen,et al.  Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.

[2]  S. Ramakrishnan,et al.  PERFORMANCE COMPARISON FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK WITH KDD DATASET , 2014, SOCO 2014.

[3]  D. E. Rumelhart,et al.  Learning internal representations by back-propagating errors , 1986 .

[4]  Igor Kotenko,et al.  MULTI-AGENT SIMULATION OF ATTACKS AND DEFENSE MECHANISMS IN COMPUTER NETWORKS , 2008 .

[5]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition , 2012 .

[6]  Stanislaw Jankowski,et al.  A Learning Technique for Deep Belief Neural Networks , 2014 .

[7]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[8]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[9]  Dong Yu,et al.  Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..

[10]  Anatoly Sachenko,et al.  THE METHODS OF ARTIFICIAL INTELLIGENCE FOR MALICIOUS APPLICATIONS DETECTION IN ANDROID OS , 2016 .

[11]  Oksana Pomorova,et al.  A Technique for Detection of Bots Which Are Using Polymorphic Code , 2014, CN.

[12]  Christian Igel,et al.  Training restricted Boltzmann machines: An introduction , 2014, Pattern Recognit..

[13]  Jimmy J. Lin,et al.  Large-scale machine learning at twitter , 2012, SIGMOD Conference.

[14]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[16]  Sanjay Ghemawat,et al.  MapReduce: simplified data processing on large clusters , 2008, CACM.

[17]  Vladimir Golovko,et al.  FUSION OF RECIRCULATION NEURAL NETWORKS FOR REAL-TIME NETWORK INTRUSION DETECTION AND RECOGNITION , 2014 .

[18]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[19]  Roberto J. Bayardo,et al.  MapReduce and Its Application to Massively Parallel Learning of Decision Tree Ensembles , 2011 .