Design of Intrusion Detection System Based on Artificial Neural Network and Application of Rough Set

نویسنده

  • Dilip Kumar Barman
چکیده

Securing data in a networked environment has been a major concern for Network Administrator as intruders may get access and steal the information available in the Computer network. As absolute security is not possible in a network, detecting intrusion is very important from the standpoint of protection of the information as well as the network. The paper intends to cover the development of an Intrusion Detection System based on Neural Network Systems. As the Intrusion Detection Systems (IDS) have to depend on known signatures, we have to train the IDS about the signatures. KDD99 is a freely available dataset for intrusion signatures and we intend to use KDD99 dataset for both training and testing our IDS. As the number of input attributes for the signatures to the IDS (for detection of the intrusion of the network) is quite high(41 in all together), minimization of the inputs to the network is very important as processing time for the inputs to be kept minimized for real time detection. Selection of the most relevant features is very important for this and concept of Rough Set has been applied for selection of the most relevant features. Effects of minimization of input features for the signatures, through use of Rough Set for Detection of Intrusions in a network, have been studied in this research paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Identification of Multiple Input-multiple Output Non-linear System Cement Rotary Kiln using Stochastic Gradient-based Rough-neural Network

Because of the existing interactions among the variables of a multiple input-multiple output (MIMO) nonlinear system, its identification is a difficult task, particularly in the presence of uncertainties. Cement rotary kiln (CRK) is a MIMO nonlinear system in the cement factory with a complicated mechanism and uncertain disturbances. The identification of CRK is very important for different pur...

متن کامل

An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set

With the increasing worldwide network attacks, intrusion detection (ID) has become a popular research topic in last decade. Several artificial intelligence techniques such as neural networks and fuzzy logic have been applied in ID. The results are varied. The intrusion detection accuracy is the main focus for intrusion detection systems (IDS). Most research activities in the area aiming to impr...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Intrusion Detection Using Modern Techniques: Integration of Genetic Algorithms and Rough Set with Neural Nets

Intrusion detection system (IDS) is now becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing an IDS. However, this requires an ability to find the mapping from the input space to the output space with the help of available data. Rough sets and neural networks are the best known data mining tools to analyze data and help solve this pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012