A Performance Evaluation of Intrusion Detection system to get better detection rate using ANN Technique

Authors

  • Aakanksha Kori  Department of Computer Science and Engineering, IES College of Technology, Bhopal, Madhya Pradesh, India
  • Harsh Mathur  Assistant Professor, Department of Computer Science and Engineering, IES College of Technology, Bhopal, Madhya Pradesh, India

Keywords:

Intrusion detection system, BP Algorithm, GSOM Algorithm

Abstract

Intrusion Detection System (IDS) is a Detection System that works for detecting malicious attacks. This can be defined as software for security management. Many researchers have proposed the Intrusion Detection System with different techniques to achieve the best accuracy. This paper outlines an investigation on the unsupervised neural network models and choice of one of them for evaluation and implementation. In this paper, the performance of intrusion detection is compared with various neural network classifiers. In the proposed research the two algorithms used are Back-propagation algorithm and Growing Self organization Map algorithm. After implementing these algorithms, we have proposed a comparative analysis between them and choose the best accuracy rate among them. Here, it has been proved that, the ANN procedure is validated against a simulated IoT network. The experimental results demonstrate far better accuracy and when use in implementation of application software, it can successfully detect various attacks.

References

  1. Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh," Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System" Systems (ICICES), pp. 232"236, 2013.
  2. Tich Phu oc Tran, "Intrusion Detection: A Brief Introduction and History", Security & Privacy " Supplement " IEEE Computer Magazine, pp. 27-30, 2002.
  3. Shun J and Malki H. A., "Limiting Uncertainty in Intrusion Response", 2001
  4. IEEE Man Systems and Cybernetics Information Assurance Workshop, pp. 142-147, 2001.
  5. Tsong Song Hwang , Tsung-Ju Lee, Yuh-Jye Lee, "A Neural Network Component for an Intrusion Detection System", Proc. 1992 IEEE Computer Society Symposium on Research in Computer Security and Privacy, pp. 240-250, 1992.
  6. Aida.O.Ali et,"A Three-tier IDS via Data-Mining Approach",MineNet’07, pp.212-217, 2007.
  7. Pohsiang Tsai, "On Spectral Clustering: Analysis and an Algorithm," Advances in Neural Information Processing Systems, Volume. 14, pp. 849-856, 2002.
  8. Timmis, Neal, and Hunt, "Anomaly Detection Based on Unsupervised Niche
  9. Clustering with Application to Network Intrusion Detection," IEEE Congress on Evolutionary Computation, Volume.10, pp. 128-138, 2008.
  10. Byoung-Doo, "Detecting Attacks on Networks", IEEE Computer, Volume. 30, No 12. Pp. 16-17, 1997.
  11. R A., H. M. Rezaul Karim, "Improving Intrusion Detection Performance using Keyword Selection and Neural Networks", Computer Networks, Volume. 34, No. 4, pp. 597-603, 2000.
  12. Tsong, "Intrusion and Misuse Detection in Large-Scale Systems", IEEE Computer Graphics and Applications, Volume. 22, No. 1, pp.38-48, 2002.
  13. Weiming Hu, "Application of Neural Networks to Intrusion Detection Classification and detection of computer intrusions", pp. 110-117, 2005.
  14. Hu Zhengbing1, "DoS intrusion detection using generalized grey self-organizing maps," 2007 IEEE International Conference on Grey Systems and Intelligent Services, pp. 1548-1551, 2007.
  15. Amit Kumar Choudhary, "Host-based intrusion detection using self-organizing maps," Proceedings of the 2002 IEEE World Congress on Computational Intelligence, Honolulu, HI, pp. 1714-1719, 2002.
  16. Stefano Zanero, "An Efficient Collaborative Intrusion Detection System for MANET Using Bayesian Approach", pp.187- 90. 2006.
  17. Liberios VOKOROKOS, "A Comparison of Intrusion Detection Systems", Computers & Security, Volume. 20, pp. 676-683, 2001.
  18. H. Günes Kayacık, "Network-based Intrusion Detection Using Ada Boost Algorithm", National Laboratory of Pattern Recognition Institute of Automation, Chinese Academy of Science.pp.468-476, 2012.
  19. Zhenwei YU, "Pattern Recognition and Machine Learning," Springer-Verlag New York, LLC, pp.121-130, 2006.
  20. V. K. Pachghare, G. Vachtsevanos, and B. Litt, "One-class novelty detection for seizure analysis from intracranial EEG", J. Machine Learning Research (JMLR), vol. 7, pp. 1025"1044, 2006.
  21. Mansour M. Alsulaiman, "An introduction to intrusion detection, Crossroads", Volume.2, Issue 4, pp. 3-7, 1996.

Downloads

Published

2017-09-30

Issue

Section

Research Articles

How to Cite

[1]
Aakanksha Kori, Harsh Mathur, " A Performance Evaluation of Intrusion Detection system to get better detection rate using ANN Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.217-223, September-October-2017.