BibTex RIS Cite

Training And Testing Anomaly-Based Neural Network Intrusion Detection Systems

Year 2013, Volume: 2 Issue: 2, 57 - 63, 28.06.2013

Abstract

Networks are up against detecting dynamic and unknown threats. Anomaly-based neural network (NN) intrusion detection systems (IDSs) can manage this if trained and tested accordingly. This requires the IDS to be evaluated on how well it can detect these intrusions. Evaluating NN IDSs can be a complex and difficult task. One needs to be able to measure the convergence rate and performance (detection and failure) rate of the IDS. This paper explores the different methods used by researchers to train and test their IDS models. It also found that the data used can effect the results of training and testing the NN IDS models.

References

  • S. M. Abdulla, N. B. Al-Dabagh, and O. Zakaria, “Identify features and parameters to devise an accurate intrusion detection system using artificial neural network”, World Academy of Science, Engineering and Technology, Vol. 70, pp. 627-631, November I. Ahmad, A. B. Abdullah and A. S. Alghamdi, “Application of artificial neural network in detection of DOS attacks”, Second International Conference on Security of Information and Networks, North Cyrus, Turkey, pp. 229-234, 6-10 October 2009.
  • V. Engen, J. Vincent, and K. Phalp, “Exploring discrepancies in findings obtained with the KDD Cup ’99 data set”, Intelligent Data Analysis, Vol.15, pp. 276, April 2011.
  • V. Engen, J. Vincent and K. Phalp, “Enhancing network based intrusion detection for imbalanced data”, International Journal of Knowledge-based and Intelligent Engineering Systems, Vol. 12, Iss. 5/6, pp. 367, December 2008.
  • D. M. Farid, J. Darmont, N. Harbi, N. H. Hoa and M. Z. Rahman, “Adaptive network intrusion detection learning: Attribute selection and classification”, World Academy of Science, Engineering and Technology, Vol. 60, pp. 154-158, December 2009.
  • M. Gao and J. Tian, “Network intrusion detection method based on improved simulated annealing neural network”, 2009 International Conference on
  • Measuring Technology and Mechatronics Automation, Zhangjiajie, Hunan, China, pp. 261-264, 12 April 2009.
  • M. Garuba, C. Liu and D. Fraites, “Intrusion techniques: Comparative study of network intrusion detection systems”, Fifth International Conference on Information Technology: New Generations, Las Vegas, NV, pp. 592-598, 7-9 April 2008.
  • W. Gong, W., Fu and L. Cai, “A neural network based intrusion data fusion model”, Third International Joint Conference on Computational Science and Optimization, Huangshan, Auhui, China, pp. 410-414, 28-31 May 2010.
  • F. Haddai, S. Khanchi, M. Shetabi and V. Derhami, “Intrusion detection and attack classification using feed-forward neural network”, Second International Conference on Computer and Network Technology, Bangkok, Thailand, pp. 262-266, 23-25 April 2010.
  • M. S. Hoque, M. A. Mukit and M. A. N. Bikas, “An implementation of intrusion detection system using genetic algorithm”, International Journal of Network Security & Its Applications, Vol. 4, No.2, pp. 109- , March 2012.
  • J. Hua and Z. Xiaofeng, “Study on the network intrusion detection model based on genetic neural network”, 2008 International Workshop on
  • Modeling, Simulation and Optimization, Hong Kong, China, pp. 60-64, 27-28 December 2008.
  • W. Jing-xin, W. Zhi-ying and D. Kui, “A network intrusion detection system based on the artificial neural networks”, Third International Conference on Information Security, Pudong, Shanghai, China, pp. 170, 14-16 November 2004.
  • D. Joo, T. Hong and I. Han, “The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors”. Expert Systems With Applications, Vol. 25, pp. 69- , July 2003.
  • S. S. Kadeeban and R. S. Rajesh, “A genetic algorithm based elucidation for improving intrusion detection through condensed feature set by KDD99 dataset”, Information and Knowledge Management, Vol. 9, No. 1, pp. 1-9, December 2011.
  • S. Rastegari, M. I. Saripan, and M. F. A. Rasid, “Detection of denial of service attacks against domain name system using neural networks”, International Journal of Computer Science Issues, Vol. 6, No. 1, pp. 23-27, November 2009.
  • J. Shum and H. A. Malki, “Network intrusion detection system using neural networks”, Fourth International Conference on Natural Computation, Jinan, China, pp. 242-246, 18-20 October 2008.
  • H. Wang and R. Ma, “Optimization of neural networks for network intrusion detection”, First International Workshop on Education Technology and Computer Science, Wuhan, Hubei, China, pp. 420, 7-8 March 2009.
Year 2013, Volume: 2 Issue: 2, 57 - 63, 28.06.2013

Abstract

References

  • S. M. Abdulla, N. B. Al-Dabagh, and O. Zakaria, “Identify features and parameters to devise an accurate intrusion detection system using artificial neural network”, World Academy of Science, Engineering and Technology, Vol. 70, pp. 627-631, November I. Ahmad, A. B. Abdullah and A. S. Alghamdi, “Application of artificial neural network in detection of DOS attacks”, Second International Conference on Security of Information and Networks, North Cyrus, Turkey, pp. 229-234, 6-10 October 2009.
  • V. Engen, J. Vincent, and K. Phalp, “Exploring discrepancies in findings obtained with the KDD Cup ’99 data set”, Intelligent Data Analysis, Vol.15, pp. 276, April 2011.
  • V. Engen, J. Vincent and K. Phalp, “Enhancing network based intrusion detection for imbalanced data”, International Journal of Knowledge-based and Intelligent Engineering Systems, Vol. 12, Iss. 5/6, pp. 367, December 2008.
  • D. M. Farid, J. Darmont, N. Harbi, N. H. Hoa and M. Z. Rahman, “Adaptive network intrusion detection learning: Attribute selection and classification”, World Academy of Science, Engineering and Technology, Vol. 60, pp. 154-158, December 2009.
  • M. Gao and J. Tian, “Network intrusion detection method based on improved simulated annealing neural network”, 2009 International Conference on
  • Measuring Technology and Mechatronics Automation, Zhangjiajie, Hunan, China, pp. 261-264, 12 April 2009.
  • M. Garuba, C. Liu and D. Fraites, “Intrusion techniques: Comparative study of network intrusion detection systems”, Fifth International Conference on Information Technology: New Generations, Las Vegas, NV, pp. 592-598, 7-9 April 2008.
  • W. Gong, W., Fu and L. Cai, “A neural network based intrusion data fusion model”, Third International Joint Conference on Computational Science and Optimization, Huangshan, Auhui, China, pp. 410-414, 28-31 May 2010.
  • F. Haddai, S. Khanchi, M. Shetabi and V. Derhami, “Intrusion detection and attack classification using feed-forward neural network”, Second International Conference on Computer and Network Technology, Bangkok, Thailand, pp. 262-266, 23-25 April 2010.
  • M. S. Hoque, M. A. Mukit and M. A. N. Bikas, “An implementation of intrusion detection system using genetic algorithm”, International Journal of Network Security & Its Applications, Vol. 4, No.2, pp. 109- , March 2012.
  • J. Hua and Z. Xiaofeng, “Study on the network intrusion detection model based on genetic neural network”, 2008 International Workshop on
  • Modeling, Simulation and Optimization, Hong Kong, China, pp. 60-64, 27-28 December 2008.
  • W. Jing-xin, W. Zhi-ying and D. Kui, “A network intrusion detection system based on the artificial neural networks”, Third International Conference on Information Security, Pudong, Shanghai, China, pp. 170, 14-16 November 2004.
  • D. Joo, T. Hong and I. Han, “The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors”. Expert Systems With Applications, Vol. 25, pp. 69- , July 2003.
  • S. S. Kadeeban and R. S. Rajesh, “A genetic algorithm based elucidation for improving intrusion detection through condensed feature set by KDD99 dataset”, Information and Knowledge Management, Vol. 9, No. 1, pp. 1-9, December 2011.
  • S. Rastegari, M. I. Saripan, and M. F. A. Rasid, “Detection of denial of service attacks against domain name system using neural networks”, International Journal of Computer Science Issues, Vol. 6, No. 1, pp. 23-27, November 2009.
  • J. Shum and H. A. Malki, “Network intrusion detection system using neural networks”, Fourth International Conference on Natural Computation, Jinan, China, pp. 242-246, 18-20 October 2008.
  • H. Wang and R. Ma, “Optimization of neural networks for network intrusion detection”, First International Workshop on Education Technology and Computer Science, Wuhan, Hubei, China, pp. 420, 7-8 March 2009.
There are 18 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Loye Ray This is me

Publication Date June 28, 2013
Submission Date January 30, 2016
Published in Issue Year 2013 Volume: 2 Issue: 2

Cite

IEEE L. Ray, “Training And Testing Anomaly-Based Neural Network Intrusion Detection Systems”, IJISS, vol. 2, no. 2, pp. 57–63, 2013.