Wavelet Fuzzy Neural Network Based on Modified QPSO for Network Anomaly Detection

Article Preview

Abstract:

Neural network (NN) employed to settle network anomaly has become prevalent. However, traditional training algorithm for NN is not optimum, that is, often suboptimum, and encountering complicated network anomaly, an adaptive yet efficient NN or hybrid NN model should be better considered. Therefore, this paper proposes a novel network anomaly detection method employing wavelet fuzzy neural network (WFNN) to use modified Quantum-Behaved Particle Swarm Optimization (QPSO). In this paper, wavelet transform is applied to extract fault characteristics from the anomaly state. Fuzzy theory and neural network are employed to fuzzify the extracted information. Wavelet is then integrated with fuzzy neural network to form the wavelet fuzzy neural network (WFNN). The Quantum-Behaved Particle Swarm Optimization, which outperforms other optimization algorithm considerably on its simple architecture and fast convergence, has previously applied to solve optimum problem. However, the QPSO also has its own shortcomings. So, there exists a modified QPSO which is used to train WFNN in this paper. Experimental result on KDD99 intrusion detection datasets shows that this WFNN using the novel training algorithm has high detection rate while maintaining a low false positive rate.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1378-1384

Citation:

Online since:

January 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Kuo I-Hong, Horng Shi-Jinn Kao, Tzong-Wann, Lin Tsung-Lieh, Lee Cheng-Ling, Terano Takao, Pan Yi, An efficient flow-shop scheduling algorithm based on a hybrid particle swarm optimization model, Expert Systems with Applications, 36(3) (2009).

DOI: 10.1016/j.eswa.2008.08.054

Google Scholar

[2] M. Ramadas, S. Ostermann, B. Tjaden, Detecting anomalous network traffic with self-organizing maps, in: Sixth International Symposium on Recent Advances in Intrusion Detection, RAID'03, (2003), pp.36-54.

DOI: 10.1007/978-3-540-45248-5_3

Google Scholar

[3] P.D. Williams, K.P. Anchor, J.L. Bebo, G.H. Gunsch, G.D. Lamont, CDIS: towards a computer immune system for detecting network intrusions, in: Fourth International Symposium on Recent Advances in Intrusion Detection, RAID'01 , (2001), pp.117-133.

DOI: 10.1007/3-540-45474-8_8

Google Scholar

[4] D.E. Denning, 'An intrusion-detection model', IEEE Transactions on Software Engineering 13 (2) (1987) 222-232.

Google Scholar

[5] Zadeh, L.A., 1994. Fuzzy logic, neural networks, and soft computing. Commun. ACM Vol. 37(1994), pp.77-84.

DOI: 10.1145/175247.175255

Google Scholar

[6] Giacinto, G., Roli, F., Didaci, L., 2003. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Lett. Vol. 24 (12) (2003), pp.1795-1808.

DOI: 10.1016/s0167-8655(03)00004-7

Google Scholar

[7] Cho, S. -B., 2002. Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Trans. Systems Man Cybernet. Vol. 32 (2) (2002), pp.154-159.

DOI: 10.1109/tsmcc.2002.801356

Google Scholar

[8] Fan, W., Miller, M., Stolfo, S., Lee, W., Chan, P., 2001. Using artificial anomalies to detect unknown and known network intrusions. In: IEEE Internet. Conf. on Data Mining, (2001), pp.123-130.

DOI: 10.1109/icdm.2001.989509

Google Scholar

[9] Lee, H.D., S.C., 2001. Training a neural-network based intrusion detector to recognize novel attacks, systems, man and cybernetics, Part A IEEE Transactions on IEEE Computer Press Vol. 31 (2001), pp.294-299.

DOI: 10.1109/3468.935046

Google Scholar

[10] Kosko B, Neural network and fuzzy systems, New Jersey Prenticl Inc., (1992).

Google Scholar

[11] Sun, J., Xu, W.B., Feng, B.: A Global Search Strategy of Quantum-behaved Particle Swarm Optimization. Proceedings of 2004 IEEE Conference on Cybernetics and Intelligent Systems. Singapore (2004), pp.111-116.

DOI: 10.1109/iccis.2004.1460396

Google Scholar

[12] Sun, J., Feng, B., Xu, W.B.: Particle Swarm Optimization with Particle Having Quantum Behavior. Proceedings of 2004 Congress on Evolutionary Computation, Piscataway, NJ (2004) pp.325-331.

DOI: 10.1109/cec.2004.1330875

Google Scholar

[13] Sun, J., Xu, W.B., Feng, B.: Adaptive Parameter Control for Quantum-behaved Particle Swarm Optimization on Individual Level. Proceeding of 2005 IEEE International Conference on Systems, Man and Cybernetics. Piscataway, NJ (2005) 3049-3054.

DOI: 10.1109/icsmc.2005.1571614

Google Scholar

[14] Kennedy, J., Eberhart, R.C.: Particle Swarm Optimization. Proceedings of IEEE International Conference on Neural Network, IV. Piscataway, NJ (1995) 1942-(1948).

Google Scholar

[15] Shi, Y.H., Eberhart, R.: A Modified Particle Swarm Optimization. Proc. IEEE International Conference on Evolutionary Computation, Anchorage, Alaska (1998) 69-73.

Google Scholar

[16] Clerc, M., Kennedy, J.: The Particle Swarm: Explosion, Stability and Convergence in a Multi-Dimensional Complex Space. IEEE Transaction on Evolutionary Computation, Vol. 6 (2002) 58-73.

DOI: 10.1109/4235.985692

Google Scholar

[17] UCI Machine Learning Repository (Online), Available: http: /www. ics. uci. edu/∼mlearn/MLRepository. html.

Google Scholar

[18] Banakar, Ahmad, Artificial wavelet neural network and its application in neuro-fuzzy models, Applied Soft Computing Journal, 8(4) (2008), pp.1463-1485.

DOI: 10.1016/j.asoc.2007.10.020

Google Scholar

[19] Zekri, Maryam, Adaptive fuzzy wavelet network control design for nonlinear systems, Fuzzy Sets and Systems, 159(20) (2008), pp.2668-2695.

DOI: 10.1016/j.fss.2008.02.008

Google Scholar

[20] El-Zonkoly, A.M., Khalil, A.A., Ahmied, N.M., Optimal tunning of lead-lag and fuzzy logic power system stabilizers using particle swarm optimization, Expert Systems with Applications, 36(2) (2009), PART 1, pp.2097-2106.

DOI: 10.1016/j.eswa.2007.12.069

Google Scholar