A Performance Evaluation of Intrusion Detection system to get better detection rate using ANN Technique

Authors(2) :-Aakanksha Kori, Harsh Mathur

Intrusion Detection System (IDS) is a Detection System that works for detecting malicious attacks. This can be defined as software for security management. Many researchers have proposed the Intrusion Detection System with different techniques to achieve the best accuracy. This paper outlines an investigation on the unsupervised neural network models and choice of one of them for evaluation and implementation. In this paper, the performance of intrusion detection is compared with various neural network classifiers. In the proposed research the two algorithms used are Back-propagation algorithm and Growing Self organization Map algorithm. After implementing these algorithms, we have proposed a comparative analysis between them and choose the best accuracy rate among them. Here, it has been proved that, the ANN procedure is validated against a simulated IoT network. The experimental results demonstrate far better accuracy and when use in implementation of application software, it can successfully detect various attacks.

Authors and Affiliations

Aakanksha Kori
Department of Computer Science and Engineering, IES College of Technology, Bhopal, Madhya Pradesh, India
Harsh Mathur
Assistant Professor, Department of Computer Science and Engineering, IES College of Technology, Bhopal, Madhya Pradesh, India

Intrusion detection system, BP Algorithm, GSOM Algorithm

  1. Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh," Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System" Systems (ICICES), pp. 232"236, 2013.
  2. Tich Phu oc Tran, "Intrusion Detection: A Brief Introduction and History", Security & Privacy " Supplement " IEEE Computer Magazine, pp. 27-30, 2002.
  3. Shun J and Malki H. A., "Limiting Uncertainty in Intrusion Response", 2001
  4. IEEE Man Systems and Cybernetics Information Assurance Workshop, pp. 142-147, 2001.
  5. Tsong Song Hwang , Tsung-Ju Lee, Yuh-Jye Lee, "A Neural Network Component for an Intrusion Detection System", Proc. 1992 IEEE Computer Society Symposium on Research in Computer Security and Privacy, pp. 240-250, 1992.
  6. Aida.O.Ali et,"A Three-tier IDS via Data-Mining Approach",MineNet’07, pp.212-217, 2007.
  7. Pohsiang Tsai, "On Spectral Clustering: Analysis and an Algorithm," Advances in Neural Information Processing Systems, Volume. 14, pp. 849-856, 2002.
  8. Timmis, Neal, and Hunt, "Anomaly Detection Based on Unsupervised Niche
  9. Clustering with Application to Network Intrusion Detection," IEEE Congress on Evolutionary Computation, Volume.10, pp. 128-138, 2008.
  10. Byoung-Doo, "Detecting Attacks on Networks", IEEE Computer, Volume. 30, No 12. Pp. 16-17, 1997.
  11. R A., H. M. Rezaul Karim, "Improving Intrusion Detection Performance using Keyword Selection and Neural Networks", Computer Networks, Volume. 34, No. 4, pp. 597-603, 2000.
  12. Tsong, "Intrusion and Misuse Detection in Large-Scale Systems", IEEE Computer Graphics and Applications, Volume. 22, No. 1, pp.38-48, 2002.
  13. Weiming Hu, "Application of Neural Networks to Intrusion Detection Classification and detection of computer intrusions", pp. 110-117, 2005.
  14. Hu Zhengbing1, "DoS intrusion detection using generalized grey self-organizing maps," 2007 IEEE International Conference on Grey Systems and Intelligent Services, pp. 1548-1551, 2007.
  15. Amit Kumar Choudhary, "Host-based intrusion detection using self-organizing maps," Proceedings of the 2002 IEEE World Congress on Computational Intelligence, Honolulu, HI, pp. 1714-1719, 2002.
  16. Stefano Zanero, "An Efficient Collaborative Intrusion Detection System for MANET Using Bayesian Approach", pp.187- 90. 2006.
  17. Liberios VOKOROKOS, "A Comparison of Intrusion Detection Systems", Computers & Security, Volume. 20, pp. 676-683, 2001.
  18. H. GŁnes Kayac?k, "Network-based Intrusion Detection Using Ada Boost Algorithm", National Laboratory of Pattern Recognition Institute of Automation, Chinese Academy of Science.pp.468-476, 2012.
  19. Zhenwei YU, "Pattern Recognition and Machine Learning," Springer-Verlag New York, LLC, pp.121-130, 2006.
  20. V. K. Pachghare, G. Vachtsevanos, and B. Litt, "One-class novelty detection for seizure analysis from intracranial EEG", J. Machine Learning Research (JMLR), vol. 7, pp. 1025"1044, 2006.
  21. Mansour M. Alsulaiman, "An introduction to intrusion detection, Crossroads", Volume.2, Issue 4, pp. 3-7, 1996.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-09-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 217-223
Manuscript Number : CSEIT172541
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Aakanksha Kori, Harsh Mathur, "A Performance Evaluation of Intrusion Detection system to get better detection rate using ANN Technique", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.217-223, September-October.2017
URL : http://ijsrcseit.com/CSEIT172541

Follow Us

Contact Us