Intrusion Detection Using Back Propagation Neural Network and Quick Reduct Algorithms

Authors

  • S. Vijaya Rani  Research Scholar, Bharathiar University, Tamil Nadu, India
  • Dr. G. N. K Suresh Babu  Associate Professor, Department of MCA, Acharya Institute of Technology, Bangalore, Karnataka, India

DOI:

https://doi.org//10.32628/CSEIT183891

Keywords:

IDS, Normalization, Neural Network, Threats, BPN, QR, ED

Abstract

It is a big challenge to safeguard a network and data due to various network threats and attacks in a network system. Intrusion detection system is an effective technique to negotiate the issues of network security by utilizing various network classifiers. It detects malicious attacks. The data sets available in the study of intrusion detection system were DARPA, KDD 1999 cup, NSL_KDD, DEFCON, ISCX-UNB, KDD 1999 cup data set is the best and old data set for research purpose on intrusion detection. The data is preprocessed, normalized and trained by BPN algorithm. Further the normalized data is discretized using Entropy discretization and feature selection carried out by quick reduct methods. After feature selection, the concerned feature from normalized data is processed through BPN for better accuracy and efficiency of the system.

References

  1. P. Ramasubramanian and A.Kannan, "Intelligent Multi Agent Based Multivariate Statistical Framework for Database intrusion prevention system". School of Computer Science and Engineering, Anna University, India.
  2. PrashantDewan, ParthsDasgopts, Vijay Karamcheti,"Defending Against Denial of Service Attacks using Secure Name Resolution".
  3. "An Analysis of current computer network attack procedures, their Mitigation measures and the development of an improved Denial of Service attack Model", IhekWeabaOgechi, Inyiama H.C, IhekWeabaChukwugoziem.
  4. "Mitigation of Denial of Service attack", Payal Jain, Juhi Jain, Zatin Gupta.
  5. "Using Artificial Intelligence in Intrusion Detection Systems", MattiManninen
  6. "Artificial Intelligence Techniques Applied to Intrusion Detection", BharanidharanShunmugam.
  7. "Study and performance evaluation on recent DDoS trends of Attack and Defense", Muhammad Aamir, Muhammad Arif
  8. "Adaption of the neural network-based IDS to new attacks detection", PrzemyslawKukielka, ZbigniewKotulski
  9. Data Security based on neural networks-Khaled M G Noaman and Hamid Abdullah Jalab.
  10. Detecting and preventing attacks using network intrusion detection systems- Meera Gandhi and S K Srivatsa
  11. Network and computer security tutorial version 0.4.0
  12. Cisco certified network professional guide.
  13. "Artificial Intelligence techniques applied to Intrusion detection" by Bharanidharan Shanmugam.
  14. "Using Artificial Intelligence in Intrusion detection Systems", Matti Manninen
  15. "Image based Authentication techniques to prevent Intrusion" by Kavya. S, Manasa.D
  16. "Detecting and preventing attacks using network intrusion detection systems", by MeeraGhandhi, S.K. Srivasta
  17. Kaur, Sukhdeep, Sharma AS, Kaur H, and Singh K (2016) Gene selection for tumor classification using resilient backpropagation neural network. In Advances in Computing, Communication, & Automation (ICACCA)(Fall), International Conference on, 1-5, IEEE.
  18. Rauber, Paulo E., Fadel SG, Falcao AX, and Telea AC (2017). Visualizing the Hidden Activity of Artificial Neural Networks. IEEE Transactions on Visualization and Computer Graphics 23(1): 101-110.
  19. Dileep, MR and Danti A (2016) Multiple hierarchical decision on neural network to predict human age and gender. In Emerging Trends in Engineering, Technology and Science (ICETETS), International Conference on, 1-6. IEEE.
  20. Salem, Asma, Zaidan D, Swidan A, and Saifan R (2016) Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices. In Cyber security and Cyber forensics Conference (CCC), 15-21. IEEE.
  21. Gautam, Kumar M and Giri VK (2016) A Neural Network approach and Wavelet analysis for ECG classification." In Engineering and Technology (ICETECH), 2016 IEEE International Conference on, 1136-1141. IEEE .
  22. Bilel, Hamdi, Selma L, and Taoufik A (2016) Artificial neural network (ANN) approach for synthesis and optimization of (3D) three-dimensional periodic phased array antenna." In Antenna Technology and Applied Electromagnetics (ANTEM), 2016 17th International Symposium on IEEE, 1-6.
  23. "Neural Networks" by Simon Haykin

Downloads

Published

2018-12-30

Issue

Section

Research Articles

How to Cite

[1]
S. Vijaya Rani, Dr. G. N. K Suresh Babu, " Intrusion Detection Using Back Propagation Neural Network and Quick Reduct Algorithms, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.317-325, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183891