全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Hybrid DNN-RBFNN Model for Intrusion Detection System

DOI: 10.4236/jdaip.2023.114019, PP. 371-387

Keywords: Dense Neural Network (DNN), Radial Basis Function Neural Network (RBFNN), Intrusion Detection System (IDS), Denial of Service (DoS), Remote to Local (R2L), User-to-Root (U2R)

Full-Text   Cite this paper   Add to My Lib

Abstract:

Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions.

References

[1]  Shanthi, S.A. and Sathiyapriya, G. (2022) Universal Approximation Theorem for a Radial Basis Function Fuzzy Neural Network. Materials Today: Proceedings, 51, 2355-2358.
https://doi.org/10.1016/j.matpr.2021.11.576
[2]  Manu, B. (2016) A Survey on Secure Network: Intrusion Detection & Prevention Approaches. American Journal of Information Systems, 4, 69-88.
[3]  Roesch, M. (1999) Snort: Lightweight Intrusion Detection for Networks. Lisa, 99, 229-238.
[4]  Parul, B. and Kumar, G. and Rajiv (2014) A Review on Attacks Classification Using Decision Tree Algorithm, Int J, 2.
[5]  Thirimanne, S.P., Jayawardana, L., Yasakethu, L., Liyanaarachchi, P. and Hewage, C. (2022) Deep Neural Network Based Real-Time Intrusion Detection System. SN Computer Science, 3, Article No. 145.
https://doi.org/10.1007/s42979-022-01031-1
[6]  Zarai, R., et al. (2020) Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System. Open Access Library Journal, 7, 1.
https://doi.org/10.4236/oalib.1106151
[7]  Vinayakumar, R. and Soman, K.P. and Poornachandran, P. (2017) Applying Convolutional Neural Network for Network Intrusion Detection. 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, 13-16 September 2017, 1222-1228.
https://doi.org/10.1109/ICACCI.2017.8126009
[8]  Miyato, T. and Dai, A.M. and Goodfellow, I. (2016) Adversarial Training Methods for Semi-Supervised Text Classification. arXiv:1605.07725.
[9]  Chen, Z. and Qian, P. (2017) Application of PSO-RBF Neural Network in Network Intrusion Detection. 2009 Third International Symposium on Intelligent Information Technology Application, Nanchang, 21-22 November 2009, 362-364.
https://doi.org/10.1109/IITA.2009.154
[10]  Otoum, Y. and Nayak, A. (2021) As-Ids: Anomaly and Signature-Based Ids for the Internet of Things. Journal of Network and Systems Management, 29, 1-26.
https://doi.org/10.1007/s10922-021-09589-6
[11]  Dina, A.S. and Manivannan, D. (2021) Intrusion Detection Based on Machine Learning Techniques in Computer Networks. Internet of Things, 16, Article ID: 100462.
https://doi.org/10.1016/j.iot.2021.100462
[12]  Lecun, Y., Bottou, L., Bengio, Y. and Haffner, P. (1998) Gradient-Based Learning Applied to Document Recognition. Proceedings of the IEEE, 86, 2278-2324.
https://doi.org/10.1109/5.726791
[13]  Guyon, I. and Elisseeff, A. (2003) An Introduction to Variable and Feature Selection. Journal of Machine Learning Research, 3, 1157-1182.
[14]  Powell, A., Bates, D., Van Wyk, C. and de Abreu, D. (1998) A Cross-Comparison of Feature Selection Algorithms on Multiple Cyber Security Data-Sets. FAIR, 86, 196-207.
[15]  Lin, Y., Zhao, H., Tu, Y., Mao, S. and Dou, Z. (2020) Threats of Adversarial Attacks in DNN-Based Modulation Recognition. IEEE INFOCOM, 2020-IEEE Conference on Computer Communications, Toronto, 6-9 July 2020, 2469-2478.
https://doi.org/10.1109/INFOCOM41043.2020.9155389
[16]  Afaq, S. and Rao, S. (2020) Significance of Epochs on Training a Neural Network, International Journal of Scientific and Technology Research, 19, 485-488.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133