Adopting genetic algorithm to develop a neural network for recognition of network intrusion

  • Authors

    • Shashank K Associate Professor,Dept. of CSE,M.I.T, Manipal, India
    • Mamatha Balachandra II Year, M.Tech,Dept. of CSE,M.I.T, Manipal, India
    2019-04-21
    https://doi.org/10.14419/ijet.v7i4.18076
  • Deep Learning, Neural Network, Genetic Algorithm, Network Intrusion, Network Security.
  • Protecting the network from unapproved access and exposure is called network security. Machine learning has been significantly useful in detecting the attack patterns. Deep learning being one among them is the standard tool for feature extraction and transformation. Building a deep learning model becomes tedious due to the substantial computation involved. Ultimately it can be optimized by suitably selecting the hyper parameters to evolve a neural network that gives the best results. The genetic algorithm is one such algorithm that can be employed to optimize the training phase of a deep learning model by selection of the best parameters. In the paper, a genetic algorithm based deep learning model is proposed to build a network intrusion detection system. NSL KDD dataset with 41 feature attributes is used to train and test the model.

     

     


  • References

    1. [1] Jin Kim, Nara Shin, Seung Yeon Jo and Sang Hyun Kim, “Method of Intrusion Detection using Deep Neural Network,†International Conference on Big Data and Smart Computing (BigComp), Jeju, Korea, IEEE, 2017. https://doi.org/10.1109/BIGCOMP.2017.7881684.

      [2] Sasanka Potluri, Christian Diedrich, “Accelerated Deep Neural Networks for Enhanced Intrusion Detection System,†IEEE Emerging Technologies and Factory Automation (ETFA), 2016. https://doi.org/10.1109/ETFA.2016.7733515.

      [3] S. K. Wagh, Vinod K Pachghare, and Satish R Kolhe, “Survey on Intrusion Detection System using Machine Learning Techniques,†Int. J. Comput. Appl., vol. 78, no. 16, pp. 30–37, 2013. https://doi.org/10.5120/13608-1412.

      [4] Nathan Shone, Tran Nguyen Ngoc, Vu Dinh Phai and Qi Shi, “A deep learning approach to network intrusion detection,†IEEE Transactions on Emerging Topics in Computational Intelligence, Vol 2., No.1, pp. 41-50, February 2018. https://doi.org/10.1109/TETCI.2017.2772792.

      [5] Rowayda A. Sadek, M. Sami Soliman and Hagar S. Elsayed, “Effective anomaly detection system based on Neural Network with Indicator variable and Rough set Reduction,â€International Journal of Computer Science Issues, Vol. 10, Issue 6, No 2,pp.227-233, November 2013.

      [6] Santosh Kumar Sahu, Sauravranjan Sarangi and Sanjaya Kumar Jena “A detail analysis on intrusion detection datasetsâ€,IEEE International Advance Computing Conference (IACC), Gurgaon, New Delhi, 2014.

      [7] Giorgos Vasiliadis, Spiros Antonatos and Evangelos P. Markatos, “GNORT: High performance newtork intrusion detection using graphics processors,†Advanced Network Fingerprinting,pp. 116-134, September 2008. https://doi.org/10.1007/978-3-540-87403-4_7.

      [8] Zhenghong Xiao, Chuling Liu and Chaotian Chen,“An Anomaly Detection Scheme Based on Machine Learning for WSNâ€, 1st International Conference on Information Science and Engineering (ICISE), Nanjing, China, 2009.

      [9] WenJie Tian and JiCheng Liu,“A New Network Intrusion Detection Identification Model Researchâ€, 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR),Wuhan, China, 2010. https://doi.org/10.1109/CAR.2010.5456628.

      [10] Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II and Mansoor Alam,“Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Gridsâ€, IEEE Transactions on Smart Grid, 2011, pp.796-808. https://doi.org/10.1109/TSG.2011.2159818.

      [11] M. Stampar and K. Fertalj “Artificial Intelligence in Network Intrusion Detectionâ€, 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 2015. https://doi.org/10.1109/MIPRO.2015.7160479.

      [12] Sofy Fitriani, Satria Mandala and Muhammad Ary Murti “Review of Semi-Supervised Method for Intrusion Detection Systemâ€, Asia Pacific Conference on Multimedia and Broadcasting (APMediaCast), Bali, Indonesia, 2016. https://doi.org/10.1109/APMediaCast.2016.7878168.

      [13] Hatungimana Girvais, Abdul Munif and Tohari Ahmad, “Using quality threshold distance to detect intrusion in TCP/IP Network,†IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), Surabaya, Indonesia, December, 2016. https://doi.org/10.1109/COMNETSAT.2016.7907421.

      [14] Deepika Venchurkar and Alpa Reshamwala, “A review of intrusion detection system using neural network and machine learning technique,†International Journal of Engineering Science and Innovative Technology,Vol. 1, Issue 2, pp. 54-63, November 2012.

      [15] Yadigar Imamverdiyev and Lyudmila Sukhostat,“Anomaly detection in network traffic using extreme learning machineâ€, IEEE 10th International Conference on Application of Information and Communication Technologies (AICT),Azerbaijan, Baku, 2016. https://doi.org/10.1109/ICAICT.2016.7991732.

      [16] Anna L. Buczak and Erhan Guven,“A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detectionâ€, IEEE Communications Surveys & Tutorials,2015, pp. 1153 – 1176. https://doi.org/10.1109/COMST.2015.2494502.

      [17] Sanjay Kumar, Ari Viinikainen and Timo Hamalainen, “Machine Learning Classification Model For Network Based Intrusion Detection Systemâ€, 11th International Conference for Internet Technology and Secured Transactions (ICITST), University of Cambridge, UK, 2016. https://doi.org/10.1109/ICITST.2016.7856705.

      [18] Zhao Jian-hua and Li Wei-hua,â€Intrusion detection based on BP Neural network and genetic algorithm,†International Conference on Information Computing and Applications, Chengde, China, September 2012. https://doi.org/10.1007/978-3-642-34041-3_61.

      [19] Andrey Ferriyan, Achmad Husni Thamrin, Keiji Takeda and Jun Murai, “Feature Selection Using Genetic Algorithm to Improve Classification in Network Intrusion Detection System,†International Electronics Symposium on Knowledge Creation and Intelligent Computing, December 2017. https://doi.org/10.1109/KCIC.2017.8228458.

      [20] Yann Carbonne and Christelle Jacob, “Genetic algorithm as machine learning for profiles recognition,†7th International Joint Conference on Computational Intelligence, November 2015. https://doi.org/10.5220/0005590501570166.

      [21] Yu Wang, Bin Song, Peng Zhang, Ning Xin and Guixing CAO, “A fast feature fusion algorithm in image classification for cyber-physical systems,†IEEE Access, pp. 9089-9098, May 2017. https://doi.org/10.1109/ACCESS.2017.2705798.

      [22] Chih-Han Chen, Maria Karvela, Mohammadreza Sohbati, Thaksin Shinawatra and Christofer Toumazou, “PERSON- Personalized expert recommendation system for optimized nutrition,â€IEEE transactions on biomedical circuits and systems, Vol 12, No 1, pp.151-160, February 2018. https://doi.org/10.1109/TBCAS.2017.2760504.

      [23] Pedram Ghamisi, Yushi Chen, Xiao Xiang Zhu, “A Self-Improving Convolution Network for the Classification of Hyperspectral Data,â€IEEE Geoscience and Remote sensing letters, Vol 13, No 10, pp. 1537-1541, August 2016. https://doi.org/10.1109/LGRS.2016.2595108.

      [24] Chen Huang, Zhihai He, Guitao Cao and Wenming Cao, “Task-Driven Progressive Part Part Localization for Fine-Grained Object Recognition,â€IEEE Transactions on multimedia, Vol 18, No 12, December 2016. https://doi.org/10.1109/TMM.2016.2602060.

      [25] Kaicheng Li, Qingpeng Gan, Lei Yuan and Qiang Fu, “Optimized Generatio of Test Sequences for High-speed Train using Deep Learning and Genetic Algorithm,†IEEE Conference on Intelligent Transportation Systems, Brazil,2016. https://doi.org/10.1109/ITSC.2016.7795644.

  • Downloads

  • How to Cite

    K, S., & Balachandra, M. (2019). Adopting genetic algorithm to develop a neural network for recognition of network intrusion. International Journal of Engineering & Technology, 7(4), 5869-5873. https://doi.org/10.14419/ijet.v7i4.18076