Skip to main content

Deep Network for Network Intrusion with Concept Drift

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 145))

  • 1294 Accesses

Abstract

A deep learning approach has been proposed for the classification of cluster instances as being intrusive or not intrusive. Mini-batch Adam optimizer was used due to a large number of hidden layers in the model. Massive amounts of data accumulated for training prevented the model from overfitting. After extensive testing of data with various algorithms, it was found that deep learning model with Adam optimizer outperformed others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Peng-Lin L (2013) Research of anomaly detection of laboring statistical data based on DBSCAN cluster algorithm. In: IEEE, Changchun

    Google Scholar 

  2. Perlovsky L, Shevchenko O (2014) Cognitive neural network for cyber-security

    Google Scholar 

  3. Tsai JJ, Philip SY, Machine learning in cyber trust security, privacy, and reliability

    Google Scholar 

  4. Singh S (2018) Using the power of deep learning for cyber security. Available: https://www.analyticsvidhya.com/blog/2018/07/using-power-deep-learningcyber-security/

  5. KS D, Ramakrishna BB (2013) An artificial neural network based intrusion detection system and classification of attacks. Available: https://pdfs.semanticscholar.org/79c8/850c8be533c241a61a80883e6ed1d559a229.pdf

  6. Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. In: 9th international conference on knowledge based and intelligent information and engineering systems

    Google Scholar 

  7. Hoens TR, Polikar R, Chawla NV (2012) Learning from streaming data with concept drift and imbalance: an overview, progress in artificial intelligence

    Google Scholar 

  8. Norouzian MR, Merati S (2011) Classifying attacks in a network intrusion detection system based on artificial neural networks. In: 13th international conference on advanced communication technology (ICACT 2011). IEE XPLORE

    Google Scholar 

  9. Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15

    Google Scholar 

  10. Kingmaand D, Ba J (2015) Adam: A Method for Stochastic Optimization. In: 3rd international conference for learning representations, San Diego

    Google Scholar 

  11. Wu Z, Kolonko M, Möhring RH (2017) Stochastic runtime analysis of the cross entropy algorithm. In: IEEE transactions on evolutionary computation

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shivam Prasad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prasad, S., Agyeya, O., Singh, P., Krishnakumar, S.S. (2021). Deep Network for Network Intrusion with Concept Drift. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 145. Springer, Singapore. https://doi.org/10.1007/978-981-15-7345-3_79

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7345-3_79

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7344-6

  • Online ISBN: 978-981-15-7345-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics