Artificial Neural Network Based Intrusion Detection Method Combined with Manifold Learning Algorithm

Article Preview

Abstract:

Computer and network security is one of the most emergency issues for a large scale of applications. The unexpected intrusion may make terrible disaster to the network users. It is therefore imperative to detect the network attacks to prevent this kind of violations. The intrusion patter recognition is now a hot topic in this research area. The use of the artificial neural networks (ANN) can provide intelligent intrusion detection. However, the intrusion detection rate is often affected by the input feature vector of the ANN. This is because the original feature space always contains a certain number of useless features. To overcome this problem, a new network intrusion detection approach based on manifold learning nonlinear feature dimension descending and ANN classifier is presented in this paper. The locally linear embedding (LLE) algorithm was used to reduce the original intrusion feature space. Then the satisfactory ANN model with proper input features was obtained. The efficiency of the proposed method was evaluated with the real intrusion data. The analysis results show that the proposed approach has good intrusion detection rate, and performs better than the standard GA-ANN method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3170-3174

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] X. Zhao, R. Jing and M. Gu: Adaptive intrusion detection algorithm based on rough sets, J T singhua Univ (Sci & Tech), Vo l. 48 (2008), pp.1165-1168.

Google Scholar

[2] Z. Li, X. Yan, C. Yuan, J. Zhao and Z. Peng: Fault detection and diagnosis of the gearbox in marine propulsion system based on bispectrum analysis and artificial neural networks, Journal of Marine Science and Application, Vol. 10 (2011), pp.17-24.

DOI: 10.1007/s11804-011-1036-7

Google Scholar

[3] A. Widodo and B. Yang, Wavelet support vector machine for induction machine fault diagnosis based on transient current signal, Expert Sys. Appl., vol. 35, p.307–316, August (2008).

DOI: 10.1016/j.eswa.2007.06.018

Google Scholar

[4] M. Belkin and P. Niyogi, Laplacian Eigenmaps for Dimensionality Reduction and Data Representation, Neural Comput., vol. 15, p.1373–1396, June (2003).

DOI: 10.1162/089976603321780317

Google Scholar

[5] J. B. Tenenbaum, V. Silva, and J. C. Langford, A global geometric framework for nonlinear dimensionality reduction, Science, vol. 290, p.2319–2323, December (2000).

DOI: 10.1126/science.290.5500.2319

Google Scholar

[6] S. Roweis and L. Saul, Nonlinear dimensionality reduction by locally linear embedding, Science, vol. 290, p.2323–2326, December (2000).

DOI: 10.1126/science.290.5500.2323

Google Scholar

[7] Q. Jiang, M. Jia, J. Hu and F. Xu, Machinery fault diagnosis using supervised manifold learning, Mech. Syst. Signal Proces., vol. 23, p.2301–2311, October (2009).

DOI: 10.1016/j.ymssp.2009.02.006

Google Scholar

[8] Russell, S. and P. Norvig, 2003. Artificial Intelligence: A Modern Approach. 2nd Edn. Prentice Hall, Inc.

Google Scholar

[9] Kohonen, T., 1997. Self-Organizing Maps. Springler-Verlag, Berlin.

Google Scholar

[10] Sin, Y.L., W.L. Low and P.Y. Wong, 2002. Learning fingerprints for a database intrusion detection system. Proc. 7th Eur. Symp. Research in Computer Security, Zurich, Switzerland, pp: 264-280.

DOI: 10.1007/3-540-45853-0_16

Google Scholar

[11] Lee, S.C. and D.V. Heinbuch, 2001. Training a neural network-based intrusion detector to recognize novel attacks. IEEE Trans. Systems, Man and Cybernetics Part A: Systems and Humans, 31: 294-299.

DOI: 10.1109/3468.935046

Google Scholar

[12] Zhou, T., X. Liao and Y. Chen, 2004. A novel symmetric cryptography based on chaotic signal generator and a clipped neural network. Advances in Neural Networks, Intl. Symp. Neural Networks Proc., Part II. Lecture Notes in Computer Science, 3174: 639-644.

DOI: 10.1007/978-3-540-28648-6_102

Google Scholar

[13] Nong, Y., S. Vilbert and Q. Chen, 2003. Computer intrusion detection through EWMA for auto correlated and uncorrelated data. IEEE Trans. Reliability, 52: 75-82.

DOI: 10.1109/tr.2002.805796

Google Scholar