طراحی یک سیستم تشخیص نفوذ به کمک روش های مبتنی بر سیستمهای هوشمند

نوع مقاله : دعوت شده

نویسندگان

گروه علوم کامپیوتر، دانشگاه شهید باهنر کرمان،کرمان، ایران

20.1001.1.27174409.1399.3.1.4.9/DOR

چکیده

ﺑﺸﺮ در ﺣﺎل ﮔﺬران ﺑﺮهه ای از ﺗﺎرﯾﺦ ﺧﻮد اﺳﺖ ﮐﻪ ﺳﯿﺴﺘﻢهای ﮐﺎﻣﭙﯿﻮﺗﺮی ﺑﻪ ﺑﺨش ﺟﺪاﯾﯽ ﻧﺎﭘﺬﯾﺮ ازﺣﯿﺎت وی ﺑﺪل ﺷﺪه اﺳﺖ. ﺳﯿﺴﺘﻢهایﮐﺎﻣﭙﯿﻮﺗﺮی و ﺑﻪﻃﻮر ﺧﺎصﺷﺒکه های ﮐﺎﻣﭙﯿﻮﺗﺮی در ﺑﺴﯿﺎری از ﺟﻨﺒﻪ های زﻧﺪگی اﻣﺮوزی ﻧﻘﺶﺗﻌﯿﯿﻦﮐﻨﻨﺪه ای داﺷﺘﻪ و ﺑﻪ همین دﻟﯿﻞ اﻣﻨﯿﺖ آن ها ﺑﺴﯿﺎر ﻣﻮرد ﺗﻮﺟﻪ اﺳﺖ. ﺑﺮای ﭘﻮﺷﺶ اﻣﻨﯿﺖ آن ها و در اﺻﻄﻼح ﺗﺸﺨﯿﺺ ﻧﻔﻮذ در شبکه های ﮐﺎﻣﭙﯿﻮﺗﺮی روش های زﯾﺎدی از ﺟﻤﻠﻪ ﺷبکه های ﻋﺼﺒﯽ ﻣﺼﻨﻮعی ﭘﯿﺸﻨهادﺷﺪه اﺳﺖ، اﻣﺎ یکی از ﭼﺎﻟﺶ های ﺷﺒکه های ﻋﺼﺒﯽ اﻓﺘﺎدن در دام بهینه های ﻣﺤلی اﺳﺖ. از دﻻﯾﻞ ﺑﺮوز اﯾﻦ ﻣﺸکل اﺳﺘﻔﺎده ازروش های مبتنی ﺑﺮﮐﺎهش ﺷﯿﺐ در ﻓﺮآﯾﻨﺪ آﻣﻮزش اﺳﺖ ﮐﻪ در ﻧﺘﯿﺠﻪ ﺑﺮای ﺣﻞ اﯾﻦ ﭼﺎﻟﺶ از روش های بهینهﺳﺎزی ﺑﺴﯿﺎری اﺳﺘﻔﺎده میﺷﻮد. در اﯾﻦ ﻣﻘﺎﻟﻪ سعی ﺷﺪه اﺳﺖ ﺑﺎ اﺳﺘﻔﺎده از اﻟگورﯾﺘﻢ رﻗﺎﺑﺖ اﺳﺘﻌﻤﺎری ﯾک ﺷﺒکه ﻋﺼﺒﯽ ﭘﺮﺳﭙﺘﺮون ﭼﻨﺪ ﻻﯾﻪ را آﻣﻮزش داده و ﺑﻪ ﻣﻨﻈﻮر ﺑﺮرسی ﮐﺎراﯾﯽ آن، روش ﭘﯿﺸﻨهادی ﺑﺎ دو روش دیگر ﻣﻘﺎﯾﺴﻪ ﺷﺪه اﺳﺖ. ﻧﺘﺎﯾﺞ روش ﭘﯿﺸﻨهادی در ﻣﻮاردی ﮐﻪ ﺗﻌﺪاد ﻧﻤﻮﻧﻪها ﺑﯿﺸﺘﺮ ﺑﻮده اﺳﺖ بهبود 10 تا 15 درﺻﺪی را ﺑﻪ دﻧﺒﺎل داﺷﺘﻪ اﺳﺖ.

کلیدواژه‌ها


[1] M. S. Abadeh, H. Mohamadi and J. Habibi, Design and analysis of genetic fuzzy systems for intrusion detection in computer networks, Expert Syst. Appl., 38 (2011), 7067-7075.
 
[2] B. Agarwal and N. Mittal, Hybrid approach for detection of anomaly network traffic using data mining techniques, Proceedings of ICCCS, (2012), Procedia Technology, 6 (2012), 996-1003.
 
[3] R. Ashok, A. Lakshmi, G. V. Rani and M. N. Kumar, Optimized feature selection with k-means clustered triangle SVM for intrusion detection, Proceedings of ICOAC, (2011), 23-27.
 
[4] E. Atashpaz-Gargari and C. Lucas, Imperialist Competitive algorithm: An algorithm for optimization inspired by imperialist competition, Proceedings of the CEC, (2007), 4661-4667.
 
[5] A. A. Aziz, S. E. Hanafi and A. E. Hassanien, Comparison of classification techniques applied for network intrusion detection and classification, J. Appl. Logic, 24 (2017), 109–118.
 
[6] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Network anomaly detection: methods, systems and tools, IEEE Commun. Surv. Tutor., 16(1) (2014), 303-336.
 
[7] E. Corchado and A. Herrero, Neural visualization of network traffic data for intrusion detection, Appl. Soft. Comput., 11 (2011), 2042-2056.
 
[8] T. Dash, A Study on Intrusion Detection Using Neural Networks Trained with Evolutionary Algorithms, soft comput., 21(10), (2017), 2687-2700.
 
[9] S. Devaraju and S. Ramakrishnan, Detection of accuracy for intrusion detection system using neural network classifier, Int. J. Emerging Technol. Adv. Eng., 3 (2013), 2250-2459.
 
[10] R. Devi, R. K. Jha, A. Gupta, S. Jain and P. Kumar, Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network, INT. J. ELECTRON. C., 74(2017), 94-106.
 
[11] W. Feng, Q. Zhang, G. Hu and J. X. Huang, Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Gener. Comput. Syst., 37 (2014), 127–140.
 
[12] F. Haddadi, S. khanchi, M. Shetabi and V. Derhami, Intrusion detection and attack classification using feed-forward neural network, Proceedings of ICCNT, (2010), 262-266.
 
[13] R. G. Helali, Data mining based network intrusion detection system: A survey, in: Novel Algorithms and Techniques in Telecommunications and Networking, Springer Science+Business, (2010).
 
[14] M. Kuchaki Rafsanjani and M. Samareh, Chaotic time series prediction by artificial neural networks, J. Comput. Meth. Sci. Eng., 16 (2016), 599-615.
 
[15] M. Kuchaki Rafsanjani and Z. A. Varzaneh, Intrusion detection by data mining algorithms: a review, J. New Resul. Sci., 2 (2013), 76-91.
 
[16] S. A. Mulay, P. R. Devale and G. V. Garje, Decision tree based support vector machine for intrusion detection, Proceedings of ICNIT, (2010), 59–63.
 
[17] S. Pilabutr, P. Somwang and S. Srinoy, Integrated soft computing for intrusion detection on computer network security, Proceedings of ICCAIE, (2011), 559-563.
 
[18] A. Rapaka, A. Novokhodko and D. Wunsch, Intrusion detection using radial basis function network on sequence of system calls, Proceedings of IJCNN03, (2003), 1820-1825.
 
[19] Z. Salek, F. M. Madani R. azmi, Intrusion detection using Neural Networks trained by differential evaluation algorithm, Proceedings of ISCISC, (2013).
 
[20] P. Sangkatsanee, N. Wattanapongsakorn and C. Charnsripinyo, Practical real-time intrusion detection using machine learning approaches, Comput. Commun., 34 (2011), 2227-2235.
 
[21] S. S. Sivatha Sindhu, S. Geetha and A. Kannan, Decision tree based light weight intrusion detection using a wrapper approach, Expert Systems with Applications, 39 (2012), 129-141.
 
[22] W. J. Tian and J. C. Liu, Network intrusion detection analysis with neural network and particle swarm optimization algorithm, Proceedings of the CCDC, (2010), 1749-1752.
 
[23] G. Wang, J. Hao, J. Ma and L. Huang, A New approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert Syst. Appl., 37 (2010), 6225-6232.
 
[24] Sh. X. Wu and W. Banzhaf, The use of computational intelligence in intrusion detection systems: a review, Appl. Soft Comput., 10 (2010), 1-35.
 
[25] C. Zhang, J. Jiang and M. Kamel, Intrusion detection using hierarchical neural networks, Pattern Recognit. Lett., 26 (2005), 779-791.