Novel Approach for Intrusion Detection Using Back Propagation Algorithm
Keywords:
Intrusion Detection System (IDS), Backpropagation (BPN) algorithm, Cloud Computing (CC), Support Vector Machine (SVM), Network Intrusion Detection SystemAbstract
Intruders are available anywhere. They want to take the benefits of the hidden or confidential information of the user. They are trying access by the different – different techniques. Intruder finding is a big problem at the current time. So that security is important to secure our system or confidential information of any organization. Intrusion Detection System (IDS) is a popular technique for finding intruders that will be available on a network. We will use the KDD CUP 99 dataset for the training purpose of the Back Propagation based IDS model. BPN is an algorithm of the artificial neural network. KDD CUP 99 dataset are authentic dataset for the intruders. This data set will be collected by the UCI Repository
References
[1] Neda Afzali Seresht, Reza Azmi: “MAID-IDS, A distributed IDS using multi-agent AIS approach", Elsevier, published the Journal of Engineering Applications of Artificial Intelligence, 35, pp 286-298, 2014.
[2] Yuxin Meng, Lam-For Kwok “Adaptive Non-critical alarm reduction using Hash-based Contextual signatures in intrusion detection", Elsevier, published in the Journal of Computer Communications, 38, pp 50-59, 2014.
[3] Chirag Modi, Dhiren Patel, Bhavesh Borisanya, Hiren Patel, Avi Patel, Muttukrishnan Rajaranjan “A survey of intrusion detection techniques in Cloud”, Elsevier, published the Journal of Network and Computer Applications, Vol.-35, Issue-1, pp 42-57, 2013.
[4] Igino Corona, Giorgio Giacinto, Fabio Roli, 2013 "Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues", Elsevier, published in the Journal of Information Sciences, Elsevier, 239, pp 201-225, 2013.
[5] Hesham Altwaijry, Saeed Algarny "Bayesian-based intrusion detection system", King Saud University, published in Journal of King Saud University – Computer and Information Sciences, Producing and Hosting by Elsevier, 24, pp 1-6, 2012.
[6] Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel "An appraisal and Design of a multi-agent system based on computational intelligence techniques", published in Science Direct, Elsevier, pp 2105-2127, 2013.
[7] Guisong Liu, Zhang Yi, Shangming Yang "A hierarchical intrusion detection model based on the PCA neural networks", published in Science Direct, Elsevier, pp 1561-1568, 2007.
[8] P. Arun Raj Kumar, S. Selvakumar "Distributed denial of service attack detection using an ensemble of neural classifier", Elsevier, published in the Journal of Computer Communications, pp 1328-1341, 2011.
[9] Bin Luo, Jingbo Xia "A novel intrusion detection system based on feature generation with visualization strategy", Elsevier, published the Journal of Expert Systems with Applications, pp 4139-4147, 2014.
[10] Mohsen Rouached, Hassen Sallay "An Efficient Formal Framework for Intrusion Detection Systems", Elsevier, published the journal of Procedia Computer Science, 10, pp 968-975, 2012.
[11] https://technet.microsoft.com/en-us/library/cc959354.aspx
[12] Mahbod Tavallaee "Detail Analysis of the KDD CUP 99 Data Set", Proceeding of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense application (CISDA 2009), 2009.
[13] Wikipedia, www.wikipedia.org.
[14] Data collection form Knowledge Discovery Dataset, UCI Repository http://kdd.ics.uci.edu/databases/kddcup99.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
