Application of Partial-Connected Dynamic and GA-Optimized Neural Networks to Misuse Detection Using Categorized and Ranked Input Features

Publish Year: 1390
نوع سند: مقاله ژورنالی
زبان: English
View: 41

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_MJEE-5-1_001

تاریخ نمایه سازی: 3 آبان 1402

Abstract:

The number of attacks in computer networks has grown extensively, and many new intrusive methods have appeared. Intrusion detection is known as an effective method to secure the information and communication systems. In this paper, the performance of Elman and partial-connected dynamic neural network (PCDNN) architectures are investigated for misuse detection in computer networks. To select the most significant features, logistic regression is also used to rank the input features of mentioned neural networks (NNs) based on the Chi-square values for different selected subsets in this work. In addition, genetic algorithm (GA) is used as an optimization search scheme to determine the sub-optimal architecture of investigated NNs with selected input features. International knowledge discovery and data mining group (KDD) dataset is used for training and test of the mentioned models in this study. The features of KDD data are categorized as basic, content, time-based traffic, and host-based traffic features. Empirical results show that PCDNN with selected input features and categorized input connections offers better detection rate (DR) among the investigated models. The mentioned NN also performs better in terms of cost per example (CPE) when compared to other proposed models in this study. False alarm rate (FAR) of the PCDNN with selected input features and categorized input connections is better than other proposed models, as well.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Cansian A.M., Moreira E., Carvalho A., and Bonifacio J.M., “Network ...
  • Yeung D.Y., Ding Y., “Host-based intrusion detection using dynamic and ...
  • Garcia-Teodoro P., Diaz-Verdejo J., Macia-Fernandez G., and Vazquez E., “Anomaly-base ...
  • Ramadas M., Ostermann S., and Tjaden B., “Detecting anomalous network ...
  • Beghdad R., “Training all the KDD data set to classify ...
  • Sheikhan M., Jadidi Z., “Misuse detection using hybrid of association ...
  • Ye N., Emran S.M., Chen Q., and Vilbert S., “Multivariate ...
  • Kruegel C., Mutz D., Robertson W., and Valeur F., “Bayesian ...
  • Song D., Heywood M.I., and Zincir-Heywood A.N., “Training genetic programming ...
  • Sequeira K., Zaki M., “ADMIT: anomaly-based data mining for intrusions”, ...
  • Dickerson J.E., “Fuzzy network profiling for intrusion detection”, in Proc. ...
  • Gomez J., Dasgupta D., “Evolving fuzzy classifiers for intrusion detection”, ...
  • Shon T., Moon J., “A hybrid machine learning approach to ...
  • Han S.J., Cho S.B., “Detecting intrusion with rule-based integration of ...
  • Novikov D., Yampolskiy R.V., and Reznik L., “Artificial intelligence approaches ...
  • Biermann E., Cloeteand E., and Venter L.M., “A comparison of ...
  • Debar H., Dorizzi B., “An application of recurrent network to ...
  • Kayacik G., Zincir-Heywood N., and Heywood M., “On the capability ...
  • Golovko V., Vaitsekhovich L., Kochurko P., and Rubanau U., “Dimensionality ...
  • Beghdad R., “Critical study of neural networks in detecting intrusions”, ...
  • Sheikhan M., Sha'bani A.A., “Fast neural intrusion detection system based ...
  • Sheikhan M., Jadidi Z., and Beheshti M., “Effects of feature ...
  • Joshi M.V., Agrawal R.C., and Kumar V., “Mining needless in ...
  • Lin Y., Chen K., and Liao X., “A genetic clustering ...
  • Pfahringer B., “Winning the KDD ۹۹ classification cup: bagged boosting”, ...
  • Levin I., “KDD classifier learning contest: LLSoft's results overview”, Journal ...
  • Denning D.E., “An intrusion-detection model”, IEEE Transactions on Software Engineering, ...
  • Mukkamala S., Janoski G., and Sung A.H., “Intrusion detection using ...
  • Abadeh M.S., Habibi J., and Lucas C., “Intrusion detection using ...
  • Tajbakhsh A., Rahmati M., and Mirzaei A., “Intrusion detection using ...
  • Sheikhan M., Gharavian D., “Combination of Elman neural network and ...
  • Sheikhan M., Khalili A., “Intrusion detection based on rule extraction ...
  • Tamilarasan A., Mukkamala S., Sung A.H., and Yendrapalli K., “Feature ...
  • KDD Cup ۱۹۹۹ Data, http://kdd.ics.uci.edu/databases/kddcup۹۹/kddcup۹۹.html, accessed July ۲۰۰۸ ...
  • Hochman R., Khoshgoftaar T.M., Allen E.B., and Hudepohl J.P., “Using ...
  • Sheikhan M., Movaghar B., “Exchange rate prediction using an evolutionary ...
  • Agrawal R., Joshi M.V., “PNrule: a new framework for learning ...
  • Duda R.O., Hart P.E., Pattern Classification and Scene Analysis, Wiley, ...
  • Han F.M., Principles of Neurocomputing for Science and Engineering, McGraw ...
  • Hartigan J.A., Clustering Algorithms, John Wiley and Sons, ۱۹۷۵ ...
  • Lee Y., Classifiers: Adaptive Modules in Pattern Recognition Systems, Cambridge, ...
  • Carpenter G.A., Grossberg S., Markuzon N., Reynolds J.H., and Rosen ...
  • Tran T.P., Jan T., “Boosted modified probabilistic neural network (BMPNN) ...
  • Chen Y., Abraham A., and Yang B., “Hybrid flexible neural-tree-based ...
  • Chang R-I., Lai L-B., Su W-D., Wang J-C., and Kouh ...
  • Venkatachalam V., Selvan S., “An approach for reducing the computational ...
  • Yu L., Chen B., and Xiao J., “An integrated system ...
  • Sabhnani M., Serpen G., “Why machine learning algorithms fail in ...
  • نمایش کامل مراجع