CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Anomaly based IDS using Backpropagation Neural Network

by Vrushali D. Mane, S.N. Pawar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 10
Year of Publication: 2016
Authors: Vrushali D. Mane, S.N. Pawar
10.5120/ijca2016908592

Vrushali D. Mane, S.N. Pawar . Anomaly based IDS using Backpropagation Neural Network. International Journal of Computer Applications. 136, 10 ( February 2016), 29-34. DOI=10.5120/ijca2016908592

@article{ 10.5120/ijca2016908592,
author = { Vrushali D. Mane, S.N. Pawar },
title = { Anomaly based IDS using Backpropagation Neural Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 10 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number10/24191-2016908592/ },
doi = { 10.5120/ijca2016908592 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:36:44.526649+05:30
%A Vrushali D. Mane
%A S.N. Pawar
%T Anomaly based IDS using Backpropagation Neural Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 10
%P 29-34
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion means illegal entry or unwelcome addition of the system. So, Intrusion detection system is used to find out the signatures of an intrusion. The goal of the system is to protect system for various network attacks like Dos, U2R, R2L, Probing etc. Intrusion detection system (IDS) collects information from various parts of network and system. This paper introduces the Anomaly Intrusion Detection System that can detect various network attacks.The aim of this work is to identify those attacks with the support of supervised neural network, i.e. back propagation artificial neural network algorithm and make complete data safe. In this paper, system comprises experimenting neural networks that use only the (17 of 41) most significant features of the KDD 99 dataset. The proposed IDS use a supervised neural network to study system's performance.

References
  1. Snehal A. Mulay, P.R. Devale & G.V. Garje “Intrusion Detection System Using Support Vector Machine and Decision Tree”, Volume 3 – No.3, June 2010.
  2. E. Eskin, M. Miller, Z. Zhong, et al. Adaptive Model Generation for Intrusion Detection Systems. Proc. Of Workshop on Intrusion Detection and Prevention, 7th ACM Conference on Computer Security, Athens, and GR: 2000.
  3. K. Anup, S. Ghosh. “A Study in Using Neural Networks for Anomaly and Misuse Detection” Proc. of the 8th USENIX Security Symposium, USENIX press, Washington, D.C., 1999, 141-151.
  4. Intrusion Detection: Challenges and myths by Marcus J. Ranum.
  5. Denning D (Feb 1987) “An Intrusion-Detection Model.” IEEE Transactions on Software Engineering, Vol. SE-13, No 2.
  6. Sufyan T. Faraj Al-Janabi and Hadeel Amjed Saeed “A Neural Network Based Anomaly Intrusion Detection System”, 2011 Developments in E-systems engineering
  7. Joseph S. Sherif & Tommy G. Dearmond, “Intrusion Detection: Systems and Models”.
  8. Yao Yu,Yang Wei & Gao Fu-xiang “Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN neural Network” 2006
  9. Vasilis A. Sotiris, Peter W. Tse, and Michael G. Pecht, Fellow “Anomaly Detection through a Bayesian Support Vector Machine” IEEE Transactions On Reliability, Vol. 59, No. 2, June 2010.
  10. Carolina Fortuna, Blaž Fortuna & Mihael “Anomaly Detection In Computer Networks Using Linear Svms” 2007.
  11. Laheeb Mohammad Ibrahim, “Anomaly Network Intrusion Detection System based on Distributed Time- Delay Neural Network (DTDNN)”, Journal of Engineering Science and Technology Vol. 5, No. 4 (2010) 457 – 471.
  12. J. Arokia Renjit and K.L. Shunmuganathan, “Network based anomaly intrusion detection system using SVM”, Indian Journal of Science and Technology, Vol. 4 No. 9 (Sep 2011) ISSN: 0974- 6846.
  13. Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, “Using Rough Set and Support Vector Machine for Network Intrusion Detection”, International Journal of Network Security & Its Applications (IJNSA),Vol 1, No 1, April 2009.
  14. Muna Mhammad T. Jawhar & Monica Mehrotra, “Design Network Intrusion Detection System using Hybrid Fuzzy-Neural Network”.
  15. Kulbhushan & Jagpreet Singh “Fuzzy Logic based Intrusion Detection System against Blackhole Attack on AODV in MANET”, IJCA Special Issue on “Network Security and Cryptography” NSC, 2011.
  16. Tanveer Fatema Khan, Zuber Farooqui, Vineet Richhariya, “Identification of Intrusions in Network for Large Data Base using Soft Computing Approach”, IJCST Vol. 3, Iss ue 1, Jan. - March 2012.
  17. Susan M. Bridges & Rayford B. Vaughn, “Intrusion Detection via Fuzzy Data Mining”, Accepted for Presentation at The Twelfth Annual Canadian Information Technology Security Symposium June 19-23, 2000, The Ottawa Congress Centre.
  18. Donald F. Specht, “A General Regression Neural Network”, IEEE Transactions on Neural Networks. Vol. 2. No. 6. November 1991.
  19. Jorge Silva & Rebecca Willett, “Hypergraph-Based Anomaly Detection of High-Dimensional Co-Occurrences”, EEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 31,no. 3, March 2009.
  20. Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall, Federal University of Santa Catarina, Brazil, “Intrusion Detection for grid & cloud computing.
  21. Rung-Ching Chen and Su-Ping Chen, “Intrusion Detection using a Hybrid Support Vector Machine based on Entropy and TF-IDF”, International Journal of Innovative Computing, Information and Control ICIC International 2008, ISSN 1349-4198 Volume 4, Number 2, February 2008.
Index Terms

Computer Science
Information Sciences

Keywords

KDD 99 dataset Network Attack.