Intrusion detection using reduced-size RNN based on feature grouping

被引:1
|
作者
Mansour Sheikhan
Zahra Jadidi
Ali Farrokhi
机构
[1] Islamic Azad University,Department of Communication Engineering, Faculty of Engineering
[2] South Tehran Branch,Department of Electronic Engineering
[3] Islamic Azad University,undefined
[4] South Tehran Branch,undefined
来源
关键词
Partial connection; Recurrent neural network; Intrusion detection; Feature grouping;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection is well-known as an essential component to secure the systems in Information and Communication Technology (ICT). Based on the type of analyzing events, two kinds of Intrusion Detection Systems (IDS) have been proposed: anomaly-based and misuse-based. In this paper, three-layer Recurrent Neural Network (RNN) architecture with categorized features as inputs and attack types as outputs of RNN is proposed as misuse-based IDS. The input features are categorized to basic features, content features, time-based traffic features, and host-based traffic features. The attack types are classified to Denial-of-Service (DoS), Probe, Remote-to-Local (R2L), and User-to-Root (U2R). For this purpose, in this study, we use the 41 features per connection defined by International Knowledge Discovery and Data mining group (KDD). The RNN has an extra output which corresponds to normal class (no attack). The connections between the nodes of two hidden layers of RNN are considered partial. Experimental results show that the proposed model is able to improve classification rate, particularly in R2L attacks. This method also offers better Detection Rate (DR) and Cost Per Example (CPE) when compared to similar related works and also the simulated Multi-Layer Perceptron (MLP) and Elman-based intrusion detectors. On the other hand, False Alarm Rate (FAR) of the proposed model is not degraded significantly when compared to some recent machine learning methods.
引用
收藏
页码:1185 / 1190
页数:5
相关论文
共 50 条
  • [41] Design of an Intrusion Detection System Based on Distance Feature Using Ensemble Classifier
    Aravind, Mithun M. A.
    Kalaiselvi, V. K. G.
    2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2017,
  • [42] Signature based Network Intrusion Detection System using Feature Selection on Android
    Cyril, Onyedeke Obinna
    Elmissaoui, Taoufik
    Okoronkwo, M. C.
    Michael, Ihedioha Uchechi M.
    Ugwuishiwu, Chikodili H.
    Onyebuchi, Okwume B.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 551 - 558
  • [43] Kernel-level intrusion detection method using simplification and grouping
    Chung, BH
    Ryu, SH
    Kim, JN
    Jang, JS
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 251 - 254
  • [44] A 35 GHz reduced-size bandpass filter based on SIW in LTCC technology
    Liu, Bingyao
    Zhou, Jianming
    Liu, Ruobing
    Wu, Qiong
    Zhang, Kunpeng
    2013 IEEE INTERNATIONAL CONFERENCE ON MICROWAVE TECHNOLOGY & COMPUTATIONAL ELECTROMAGNETICS (ICMTCE), 2013, : 77 - 80
  • [45] A Feature Reduced Intrusion Detection System with Optimized SVM Using Big Bang Big Crunch Optimization
    Mohit Nagpal
    Manisha Kaushal
    Wireless Personal Communications, 2022, 122 : 1939 - 1965
  • [46] A Feature Reduced Intrusion Detection System with Optimized SVM Using Big Bang Big Crunch Optimization
    Nagpal, Mohit
    Kaushal, Manisha
    Sharma, Akashdeep
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (02) : 1939 - 1965
  • [47] UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation
    Nagaraja, Arun
    Uma, B.
    Gunupudi, Rajesh kumar
    FOUNDATIONS OF SCIENCE, 2020, 25 (04) : 1049 - 1075
  • [48] UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation
    Arun Nagaraja
    B. Uma
    Rajesh kumar Gunupudi
    Foundations of Science, 2020, 25 : 1049 - 1075
  • [49] An intrusion detection system using ranked feature bagging
    Azhagiri M.
    Rajesh A.
    Karthik S.
    Raja K.
    International Journal of Information Technology, 2024, 16 (2) : 1213 - 1219
  • [50] Feature selection using rough set in intrusion detection
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 2026 - +