Intrusion detection using neural based hybrid classification methods

被引:53
作者
Govindarajan, M. [1 ]
Chandrasekaran, R. M. [1 ]
机构
[1] Annamalai Univ, Dept Comp Sci & Engn, Annamalainagar 608002, Tamil Nadu, India
关键词
Data mining; Classification; Ensemble; Hybrid architecture; Intrusion detection; GENETIC ALGORITHMS; NETWORKS; INDUCTION; ENSEMBLE; SYSTEM;
D O I
10.1016/j.comnet.2010.12.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process. Classification is a very common data mining task. Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. This paper presents two classification methods involving multilayer perceptron and radial basis function and an ensemble of multilayer perceptron and radial basis function. We propose hybrid architecture involving ensemble and base classifiers for intrusion detection systems. The analysis of results shows that the performance of the proposed method is superior to that of single usage of existing classification methods such as multilayer perceptron and radial basis function. Additionally it has been found that ensemble of multilayer perceptron is superior to ensemble of radial basis function classifier for normal behavior and reverse is the case for abnormal behavior. We show that the proposed method provides significant improvement of prediction accuracy in intrusion detection. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1662 / 1671
页数:10
相关论文
共 52 条
[1]  
Abraham A., 2001, Connectionist Models of Neurons, Learning Processes, and Artificial Intelligence. 6th International Work-Conference on Artificial and Natural Neural Networks, IWANN 2001. Proceedings, Part I (Lecture Notes in Computer Science Vol. 2084), P269
[2]  
Ali KM, 1996, MACH LEARN, V24, P173, DOI 10.1007/BF00058611
[3]  
ANDERSON D, 1995, NIDES TECHNICAL REPO
[4]  
[Anonymous], 1998, Genetic programming: an introduction: on the automatic evolution of computer programs and its applications
[5]  
Bigus J. P., 1996, DATA MINING NEURAL N
[6]  
Breiman L, 1996, MACH LEARN, V24, P123, DOI 10.1023/A:1018054314350
[7]   Evolutionary optimization of radial basis function classifiers for data mining applications [J].
Buchtala, O ;
Klimek, M ;
Sick, B .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2005, 35 (05) :928-947
[8]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[9]  
Chen YPP, 2003, LECT NOTES ARTIF INT, V2873, P153
[10]   Efficient anomaly detection by modeling privilege flows using hidden Markov model [J].
Cho, SB ;
Park, HJ .
COMPUTERS & SECURITY, 2003, 22 (01) :45-55