Abstract
A deep learning approach has been proposed for the classification of cluster instances as being intrusive or not intrusive. Mini-batch Adam optimizer was used due to a large number of hidden layers in the model. Massive amounts of data accumulated for training prevented the model from overfitting. After extensive testing of data with various algorithms, it was found that deep learning model with Adam optimizer outperformed others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Peng-Lin L (2013) Research of anomaly detection of laboring statistical data based on DBSCAN cluster algorithm. In: IEEE, Changchun
Perlovsky L, Shevchenko O (2014) Cognitive neural network for cyber-security
Tsai JJ, Philip SY, Machine learning in cyber trust security, privacy, and reliability
Singh S (2018) Using the power of deep learning for cyber security. Available: https://www.analyticsvidhya.com/blog/2018/07/using-power-deep-learningcyber-security/
KS D, Ramakrishna BB (2013) An artificial neural network based intrusion detection system and classification of attacks. Available: https://pdfs.semanticscholar.org/79c8/850c8be533c241a61a80883e6ed1d559a229.pdf
Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. In: 9th international conference on knowledge based and intelligent information and engineering systems
Hoens TR, Polikar R, Chawla NV (2012) Learning from streaming data with concept drift and imbalance: an overview, progress in artificial intelligence
Norouzian MR, Merati S (2011) Classifying attacks in a network intrusion detection system based on artificial neural networks. In: 13th international conference on advanced communication technology (ICACT 2011). IEE XPLORE
Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15
Kingmaand D, Ba J (2015) Adam: A Method for Stochastic Optimization. In: 3rd international conference for learning representations, San Diego
Wu Z, Kolonko M, Möhring RH (2017) Stochastic runtime analysis of the cross entropy algorithm. In: IEEE transactions on evolutionary computation
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prasad, S., Agyeya, O., Singh, P., Krishnakumar, S.S. (2021). Deep Network for Network Intrusion with Concept Drift. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 145. Springer, Singapore. https://doi.org/10.1007/978-981-15-7345-3_79
Download citation
DOI: https://doi.org/10.1007/978-981-15-7345-3_79
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7344-6
Online ISBN: 978-981-15-7345-3
eBook Packages: EngineeringEngineering (R0)