Skip to main content

Hybrid Intelligent Intrusion Detection Scheme

  • Conference paper
Soft Computing in Industrial Applications

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 96))

Abstract

This paper introduces a hybrid scheme that combines the advantages of deep belief network and support vector machine. An application of intrusion detection imaging has been chosen and hybridization scheme have been applied to see their ability and accuracy to classify the intrusion into two outcomes: normal or attack, and the attacks fall into four classes; R2L, DoS, U2R, and Probing. First, we utilize deep belief network to reduct the dimensionality of the feature sets. This is followed by a support vector machine to classify the intrusion into five outcome; Normal, R2L, DoS, U2R, and Probing. To evaluate the performance of our approach, we present tests on NSL-KDD dataset and show that the overall accuracy offered by the employed approach is high.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shon, T., Moon, J.: A hybrid machine learning approach to network anomaly detection. Information Sciences 177, 3799–3821 (2007)

    Article  Google Scholar 

  2. Anderson, J.P.: Computer security threat monitoring and surveillance.Technical Report, James P. Anderson Co., Fort Washington (April 1980)

    Google Scholar 

  3. Stallings, W.: Cryptography and network security principles and practices. Prentice Hall, USA (2006)

    Google Scholar 

  4. Tsai, C., Hsu, Y., Lin, C., Lin, W.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36, 11994–12000 (2009)

    Article  Google Scholar 

  5. Biermann, E., Cloete, E., Venter, L.M.: A comparison of intrusion detection Systems. Computer and Security 20, 676–683 (2001)

    Article  Google Scholar 

  6. Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer Communications 25, 1356–1365 (2002)

    Article  Google Scholar 

  7. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis:A rule-based intrusion detection approach. IEEE Trans. Software Eng. 21, 181–199 (1995)

    Article  Google Scholar 

  8. Marchette, D.: A statistical method for profiling network traffic. In: proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring (Santa Clara), CA, pp. 119–128 (1999)

    Google Scholar 

  9. Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection: support vector machines and neural networks. In: Proceedings of the IEEE International Joint Conference on Neural Networks (ANNIE), St. Louis, MO, pp. 1702–1707 (2002)

    Google Scholar 

  10. Lundin, E., Jonsson, E.: Anomaly-based intrusion detection: privacy concerns and other problems. Computer Networks 34, 623–640 (2002)

    Article  Google Scholar 

  11. Wu, S., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing 10, 1–35 (2010)

    Article  MATH  Google Scholar 

  12. Mohamed, A.R., Dahl, G., Hinton, G.E.: Deep belief networks for phone recognition. In: NIPS 22 Workshop on Deep Learning for Speech Recognition (2009)

    Google Scholar 

  13. Hinton, G.E.: A fast learning algorithm for deep belief nets. Neural Computation 18, 1527–1554 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Noulas, A.K., Krse, B.J.A.: Deep Belief Networks for Dimensionality Reduction. In:Belgian-Dutch Conference on Artificial Intelligence, Netherland (2008)

    Google Scholar 

  15. Larochelle, H., Bengio, Y.: Classification using discriminative restricted boltzmann machines. In: Proceedings of the 25th International Conference on Machine learning, vol. 307, pp. 536–543 (2008)

    Google Scholar 

  16. McAfee, L.: Document Classification using Deep Belief Nets, CS224n, Sprint (2008)

    Google Scholar 

  17. Larochelle, H., Bengio, Y., Louradour, J., Lamblin, P.: Exploring Strategies for Training Deep Neural Networks. Journal of Machine Learning Research 10, 1–40 (2009)

    Google Scholar 

  18. Cohen, I., Tian, Q., Zhou, X.S., Huang, T.S.: Feature Selection Using Principal Feature Analysis. In: Proceedings of the 15th International Conference on Multimedia, Augsburg, Germany, September 25-29 (2007)

    Google Scholar 

  19. KDD 1999 dataset Irvine, CA, USA (July 2010), http://kdd.ics.uci.edu/databases

  20. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A Detailed Analysis of the KDD CUP 99 Data Set. In: Proceeding of the IEEE Symposium on Computational Intelligence in security and defense application, CISDA (2009)

    Google Scholar 

  21. Weka. Data Mining Software in java, http://www.cs.waikato.ac.nz/ml/weka/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salama, M.A., Eid, H.F., Ramadan, R.A., Darwish, A., Hassanien, A.E. (2011). Hybrid Intelligent Intrusion Detection Scheme. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds) Soft Computing in Industrial Applications. Advances in Intelligent and Soft Computing, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20505-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20505-7_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20504-0

  • Online ISBN: 978-3-642-20505-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics