A study on intrusion detection using neural networks trained with evolutionary algorithms

被引:0
|
作者
Tirtharaj Dash
机构
[1] National Institute of Science and Technology,Data Science Laboratory, School of Computer Science
[2] Birla Institute of Technology and Science Pilani,Department of Computer Science and Information Systems
来源
Soft Computing | 2017年 / 21卷
关键词
Intrusion detection; Intrusion detection system; Artificial neural network; NSL-KDD;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection has been playing a crucial role for making a computer network secure for any transaction. An intrusion detection system (IDS) detects various types of malicious network traffic and computer usage, which sometimes may not be detected by a conventional firewall. Recently, many IDS have been developed based on machine learning techniques. Specifically, advanced detection approaches created by combining or integrating evolutionary algorithms and neural networks have shown better detection performance than general machine learning approaches. The present study reports two new hybrid intrusion detection methods; one is based on gravitational search (GS), and other one is a combination of GS and particle swarm optimization (GSPSO). These two techniques have been successfully implemented to train artificial neural network (ANN) and the resulting models: GS-ANN and GSPSO-ANN are successfully applied for intrusion detection process. The applicability of these proposed approaches is also compared with other conventional methods such as decision tree, ANN based on gradient descent (GD-ANN), ANN based on genetic algorithm (GA-ANN) and ANN based on PSO (PSO-ANN) by testing with NSL-KDD dataset. Moreover, the results obtained by GS-ANN and GSPSO-ANN are found to be statistically significant based on the popular Wilcoxon’s rank sum test as compared to other conventional techniques. The obtained test results reported that the proposed GS-ANN and GSPSO-ANN could achieve a maximum detection accuracy of 94.9 and 98.13 % respectively. The proposed models (GS-ANN and GSPSO-ANN) could also achieve good performance when tested with highly imbalanced datasets.
引用
收藏
页码:2687 / 2700
页数:13
相关论文
共 50 条
  • [1] A study on intrusion detection using neural networks trained with evolutionary algorithms
    Dash, Tirtharaj
    SOFT COMPUTING, 2017, 21 (10) : 2687 - 2700
  • [2] Intrusion Detection Using Evolutionary Neural Networks
    Michailidis, Emmanuel
    Katsikas, Sokratis K.
    Georgopoulos, Efstratios
    PCI 2008: 12TH PAN-HELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2008, : 8 - +
  • [3] Optimization with neural networks trained by evolutionary algorithms
    Velazco, MI
    Lyra, C
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1516 - 1521
  • [4] Rule extraction from neural networks trained using evolutionary algorithms with deterministic mutation
    Fukumi, M
    Akamatsu, N
    IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, 1998, : 686 - 689
  • [5] Estimation of Pseudo-Range DGPS Corrections Using Neural Networks Trained by Evolutionary Algorithms
    Mosavi, M. R.
    INTERNATIONAL REVIEW OF ELECTRICAL ENGINEERING-IREE, 2010, 5 (06): : 2715 - 2721
  • [6] A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
    Benmessahel, Ilyas
    Xie, Kun
    Chellal, Mouna
    APPLIED INTELLIGENCE, 2018, 48 (08) : 2315 - 2327
  • [7] A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
    Ilyas Benmessahel
    Kun Xie
    Mouna Chellal
    Applied Intelligence, 2018, 48 : 2315 - 2327
  • [8] USING NEURAL NETWORKS IN INTRUSION DETECTION SYSTEMS
    Merhaut, Filip
    Zelinka, Ivan
    MENDEL 2008, 2008, : 172 - 174
  • [9] Intrusion detection using hierarchical neural networks
    Zhang, CL
    Jiang, J
    Kamel, M
    PATTERN RECOGNITION LETTERS, 2005, 26 (06) : 779 - 791
  • [10] Intrusion detection using PCASOM neural networks
    Liu, Guisong
    Yi, Zhang
    ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 240 - 245