Design of an Intrusion Detection System Using Methods Based On Intelligent Systems

Authors

20.1001.1.27174409.1399.3.1.4.9/DOR

Abstract

Humans are going through a period of their history that computer systems have become an integral part of his life. Computer systems, particularly computer networks, have played a crucial role in many aspects of today's life, so their security is highly regarded. In order to cover their security and the so - called penetration detection in computer networks, many methods such as artificial neural networks are proposed, but one of the challenges of neural networks is to fall into local. The main reason for this problem is the use of slope - based methods in the training process, which is therefore used to solve this challenge by many optimization methods. In this paper, we have tried to train a multilayer perceptron neural network using the colonial competition algorithm and in order to evaluate its efficiency, the proposed method is compared with two other methods. The results of the proposed method have improved 10 - 15 % improvement in cases where the number of samples was higher.

Keywords


[1] M. S. Abadeh, H. Mohamadi and J. Habibi, Design and analysis of genetic fuzzy systems for intrusion detection in computer networks, Expert Syst. Appl., 38 (2011), 7067-7075.
 
[2] B. Agarwal and N. Mittal, Hybrid approach for detection of anomaly network traffic using data mining techniques, Proceedings of ICCCS, (2012), Procedia Technology, 6 (2012), 996-1003.
 
[3] R. Ashok, A. Lakshmi, G. V. Rani and M. N. Kumar, Optimized feature selection with k-means clustered triangle SVM for intrusion detection, Proceedings of ICOAC, (2011), 23-27.
 
[4] E. Atashpaz-Gargari and C. Lucas, Imperialist Competitive algorithm: An algorithm for optimization inspired by imperialist competition, Proceedings of the CEC, (2007), 4661-4667.
 
[5] A. A. Aziz, S. E. Hanafi and A. E. Hassanien, Comparison of classification techniques applied for network intrusion detection and classification, J. Appl. Logic, 24 (2017), 109–118.
 
[6] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Network anomaly detection: methods, systems and tools, IEEE Commun. Surv. Tutor., 16(1) (2014), 303-336.
 
[7] E. Corchado and A. Herrero, Neural visualization of network traffic data for intrusion detection, Appl. Soft. Comput., 11 (2011), 2042-2056.
 
[8] T. Dash, A Study on Intrusion Detection Using Neural Networks Trained with Evolutionary Algorithms, soft comput., 21(10), (2017), 2687-2700.
 
[9] S. Devaraju and S. Ramakrishnan, Detection of accuracy for intrusion detection system using neural network classifier, Int. J. Emerging Technol. Adv. Eng., 3 (2013), 2250-2459.
 
[10] R. Devi, R. K. Jha, A. Gupta, S. Jain and P. Kumar, Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network, INT. J. ELECTRON. C., 74(2017), 94-106.
 
[11] W. Feng, Q. Zhang, G. Hu and J. X. Huang, Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Gener. Comput. Syst., 37 (2014), 127–140.
 
[12] F. Haddadi, S. khanchi, M. Shetabi and V. Derhami, Intrusion detection and attack classification using feed-forward neural network, Proceedings of ICCNT, (2010), 262-266.
 
[13] R. G. Helali, Data mining based network intrusion detection system: A survey, in: Novel Algorithms and Techniques in Telecommunications and Networking, Springer Science+Business, (2010).
 
[14] M. Kuchaki Rafsanjani and M. Samareh, Chaotic time series prediction by artificial neural networks, J. Comput. Meth. Sci. Eng., 16 (2016), 599-615.
 
[15] M. Kuchaki Rafsanjani and Z. A. Varzaneh, Intrusion detection by data mining algorithms: a review, J. New Resul. Sci., 2 (2013), 76-91.
 
[16] S. A. Mulay, P. R. Devale and G. V. Garje, Decision tree based support vector machine for intrusion detection, Proceedings of ICNIT, (2010), 59–63.
 
[17] S. Pilabutr, P. Somwang and S. Srinoy, Integrated soft computing for intrusion detection on computer network security, Proceedings of ICCAIE, (2011), 559-563.
 
[18] A. Rapaka, A. Novokhodko and D. Wunsch, Intrusion detection using radial basis function network on sequence of system calls, Proceedings of IJCNN03, (2003), 1820-1825.
 
[19] Z. Salek, F. M. Madani R. azmi, Intrusion detection using Neural Networks trained by differential evaluation algorithm, Proceedings of ISCISC, (2013).
 
[20] P. Sangkatsanee, N. Wattanapongsakorn and C. Charnsripinyo, Practical real-time intrusion detection using machine learning approaches, Comput. Commun., 34 (2011), 2227-2235.
 
[21] S. S. Sivatha Sindhu, S. Geetha and A. Kannan, Decision tree based light weight intrusion detection using a wrapper approach, Expert Systems with Applications, 39 (2012), 129-141.
 
[22] W. J. Tian and J. C. Liu, Network intrusion detection analysis with neural network and particle swarm optimization algorithm, Proceedings of the CCDC, (2010), 1749-1752.
 
[23] G. Wang, J. Hao, J. Ma and L. Huang, A New approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert Syst. Appl., 37 (2010), 6225-6232.
 
[24] Sh. X. Wu and W. Banzhaf, The use of computational intelligence in intrusion detection systems: a review, Appl. Soft Comput., 10 (2010), 1-35.
 
[25] C. Zhang, J. Jiang and M. Kamel, Intrusion detection using hierarchical neural networks, Pattern Recognit. Lett., 26 (2005), 779-791.