AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM

Trần Thị Hương, Phạm Văn Hạnh

Abstract


Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. In this paper, we present a model based on the combination of recurrent neural networks and rule sets for the network intrusion detection problem. The main idea of the model is to combine the strengths of each classification model. The rule set is capable of detecting known attacks, while the recurrent neural network has the advantage of detecting new attacks. A comparison of the detection efficiency of our model with the previous detection models on the same data set, KDD CUP 99, shows that the proposed model is effective for detecting network intrusions at rates higher than 99%.


Keywords


Intrusion detection system; Recurrent neural network; Rule-based.

References


Al-Mamory, S. O., & Jassim, F. S. (2013). Evaluation of different data mining algorithms with KDD Cup 99 dataset. Journal of Babylon University/Pure and Applied Sciences, 21(8), 2663-2670.

Bhavasar, Y. B., & Waghmare, K. C. (2013). Intrusion detection system using data mining technique: Support Vector Machines. International Journal of Emerging Technology and Advanced Engineering, 3(3), 581-586.

Bouzida, Y., & Cuppens, F. (2006). Neural networks vs decision tree for intrusion detection. Retrieved from http://www.diadem-firewall.org/workshop06/papers/monam06-paper-29.pdf.

Kayacik, G., Heywood, A. N. Z., & Heywood, I. M. (2005). Selecting features for intrusion detection: A feature relevance analysis on KDD 99. Paper presented at The Third Annual Conference on Privacy, Securitty and Trust, Canada.

Kim, J., & Kim, H. (2016). Applying recurrent neural network to intrusion detection with hessian free optimization. In H. Kim, & D. Choi (Eds), Information Security Applycations (pp. 357-369). Berlin, Germany: Springer Publishing.

Martens, J., & Sutskver, I. (2011). Learning recurrent neural networks with Hessian free optimizations. Paper presented at The 28th International Conference on Machine Learning, USA.

Moradi, M., & Zulkemine, M. (2004). A neural network based system for intrusion detection and classification of attacks. Paper presented at The International Conference on Advances in Intelligent System, Luxembourg.

Mukkamala, S., Janoski, G., & Sung, A. (2002). Intrusion detection: Support Vector Machines and neural networks. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.407.7230&rep=rep1&type=pdf.

Sethuramalingam, S., & Naganathan, D. (2011). Hybrid feature selection for network intrusion. International Journal on Computer Science and Engineering, 3(5), 1773-1780.

Sodiya, A. S., & Akinola, O. C. (2014). Neural network based intrusion detection systems. International Journal of Computer Applications, 106(18), 19-24.

Subba, B., Biswas, S., & Karmakar, S. (2015). Intrusion detection system using linear discriminant analysis and logictic regression. Paper presented at The Annual IEEE India Conference, India.

Sung, A. H., & Mukkamala, S. (2003). Feature selection for intrusion detection using neural networks and Support Vector Machines. Retrieved from https://www.researchgate.net/publication/228966999_Feature_Selection_for_Intrusion_Detection_with_Neural_Networks_and_Support_Vector_Machines.

Yin, C., Yuenfei, Z., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954-21961.




DOI: http://dx.doi.org/10.37569/DalatUniversity.9.2.544(2019)

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Trần Thị Hương, Phạm Văn Hạnh.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Editorial Office of DLU Journal of Science
Room.15, A25 Building, 01 Phu Dong Thien Vuong Street, Dalat, Lamdong
Email: tapchikhoahoc@dlu.edu.vn - Phone: (+84) 263 3 555 131

Creative Commons License
Based on Open Journal Systems
Developed by Information Technology Department