International Journal of Innovative Research in Engineering and Management
Year: 2016, Volume: 4, Issue: 3
First page : ( 94) Last page : ( 101)
Online ISSN : 2350-0557.
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
BRIJPAL SINGH , DR. ANIL KR. AHLAWAT
Intrusion detection system based on Artificial Neural Network (ANN) is a very active field that detects normal or attack connection on the network and can improve the performance of Intrusion detection system (IDS), the flash alarm rate in establishing intrusive activities can be reduced. At present computer network and cloud based computing technology is used by an increasing number of users. Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. The areas like business, finance, medical, security sectors have made us reliant on the computer networks. It is important to secure system for which we require strong intrusion detection system which is capable of monitoring network which carries huge amount of data packets as well as reports malicious activity that occurs in the system. Therefore some strategy is needed for best promising security to monitor the anomalous behavior in computer network. A discussion of the upcoming technology and various methodologies which promise to improve the capability of computer system to detect intrusions is offered. In the proposed approach the Artificial Neural Network (ANN) algorithms are used as classifiers for detecting the normal and attack records by training and testing the KDD CUP 99 dataset. It is proved that the FFNN with 10 neurons and 2 layers has performed better over FFNN with different number of neurons and 2 layers.
[1] Norouzian M.R., Merati. S., “Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks” Proceedings of the Advanced Communication Technology (ICACT), 2011 13th International Conference on Publication Year: 2011 , Page(s): 868 - 873
[2] B. Abdullah, I. Abd-alghafar, Gouda I. Salama & A. Abd-alhafez, (2009) “Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System”, 13th International Conference on Aerospace Sciences and Aviation Technology (ASAT), May 26-28.
[3] J. Gomez & D. Dasgupta, (2002) “Evolving Fuzzy Classifiers for Intrusion Detection”, IEEE Proceedings of the IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY.
[4] “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering” Gang Wang a,b,*, Jinxing Hao b, Jian Mab, Lihua Huang a School of Management, Fudan University, Shanghai 200433, PR China b Department of Information Systems, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong Expert Systems with Applications xxx (2010) xxx–xxx
[5] M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani.: “A Detailed Analysis of the KDD CUP Data Set”. In: Second IEEE Symposium on CISDA, pp. 1-6. IEEE, Ottawa ON (2009)
[6] Wanli Ma, Dat Tran and Dharmendra Sharma.: “A Study on the Feature Selection of Network Traffic for Intrusion Detection Purpose”. In: Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, pp. 245-247, Taiwan June 17-20 (2008)
[7]. The KDD99 https://archive.ics.uci.edu/ml/machine-learningdatabases/kddcup99-mld/kddcup99.html
[8] “NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGICR”. Shanmugavadivu Assistant professor, Department of Computer Science PSG College of Arts & Science, Coimbatore-14 R. Shanmugavadivu et al./ Indian Journal of Computer Science and Engineering (IJCSE) ISSN : 0976-5166 Vol. 2 No. 1
[9]. Cannady J. (1998). “ Artificial neural networks for misuse detection” .Proceedings of the 1998 National Information Systems Security Conference (NISSC'98), 443-456, Arlington, VA.
[10]. Moradi, M.; and Zulkernine, M. (2004). “A neural network based system for intrusion detection and classification of attacks”. IEEE International Conference on Advances in Intelligent Systems - Theory and pplications, Luxembourg-Kirchberg, Luxembourg.
[11]. Siddiqui, M.A. (2004). “High performance data mining techniques for intrusion detection”. MSc. Thesis, University of Engineering & Technology,School of Computer Science, College of Engineering & Computer Science at the University of Central Florida.
[12]. Sheikhan, M.; and Gharavianm, D. (2009). “Combination of Elman neural network and classification-based predictive association rules to improve computer networks security”, World Applied Sciences Journal, 7, Special Issue of Computer & IT, 80-86
[13]. Panda, M. (2010). “Discriminative multinomial Naïve Bayes for network intrusion detection”. 2010 Sixth International Conference on Information Assurance and Security (IAS), 5-10.
[14]. Chhavi Goel and Arun Sharma,(2015)“Network Intrusion Detection Using Artificial Neural Networks” CSI-2015 50thGolden Jubilee Annual Convention on “Digital Life”, December, 2015, New Delhi.
[15] Brijpal Singh & Prof. Dr. Anil A. Ahlawat, (2013), “Intrusion detection of Network AttacksUsing Artificial Neural Networks & Fuzzy Logic”, International Journal of Engineering & Management Technology IJEMT (March) 2013, ISSN: 2320-7043
[16] Anil Ahlawat et.al, “A Novel Self-Organizing Map (SOM) learning algorithm with nearest and farthest neurons”,Allexandria Engineering Journal(Elsevier),Vol 53,827-831,October 2014
Research Scholar Department of Computer Science, Mewar University. Chittorgarh, Rajasthan, India,
No. of Downloads: 12 | No. of Views: 1474
Shivaraj Yanamandram Kuppuraju, Sharad Shyam Ojha, Mrinal Kumar.
March 2025 - Vol 13, Issue 2
Shiva Kiran Lingishetty, Chandrashekhar Moharir, Mrinal Kumar.
March 2025 - Vol 13, Issue 2
Dr. Vishal Kishorchandra Pandya, Joshi Keyur Ramesh, Modha Vivek Pankajbhai.
March 2025 - Vol 13, Issue 2