Skip to main content

Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection

  • Conference paper
  • First Online:
Book cover Intelligent Computing Theories and Application (ICIC 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11643))

Included in the following conference series:

Abstract

Intrusion Detection is crucial in cybersecurity. So is the ability to identify the myriad of attacks. Artificial Neural Networks are an established and proven method of accurate classification. There are approaches to make ANN models faster by applying Principal Component Analysis as a feature extractor. However, ANNs are extremely versatile, a wide range of setups can achieve significantly different classification results. The main contribution of this paper is the evaluation of the way the hyperparameters can influence the final classification result. In this paper, a wide range of ANN setups is put to comparison, and the finest arrangement achieves the multi-class classification accuracy of 99.909% on an established benchmark dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. McGraw, G., Morrisett, G.: Attacking malicious code: a report to the Infosec Research Council. IEEE Softw. 17(5), 33–41 (2000)

    Article  Google Scholar 

  2. Bielec, A.: Analysis of a polish bankbot (2018)

    Google Scholar 

  3. Kelion, L.: eBay redirect attack puts buyers’ credentials at risk (2014)

    Google Scholar 

  4. Mutton, P.: Hackers still exploiting eBay’s stored XSS vulnerabilities in 2017 (2017)

    Google Scholar 

  5. Lee, D.: MyFitnessPal breach affects millions of under armour users (2018)

    Google Scholar 

  6. Idika, N., Mathur, A.: A survey of malware detection techniques. Purdue University, March 2007

    Google Scholar 

  7. Canfora, G., Di Sorbo, A., Mercaldo, F., Visaggio, C.A.: Obfuscation techniques against signature-based detection: a case study. In: 2015 Mobile Systems Technologies Workshop (MST), pp. 21–26, May 2015

    Google Scholar 

  8. Sani, Y., Mohamedou, A., Ali, K., Farjamfar, A., Azman, M., Shamsuddin, S.: An overview of neural networks use in anomaly intrusion detection systems. In: 2009 IEEE Student Conference on Research and Development (SCOReD), pp. 89–92, November 2009

    Google Scholar 

  9. Haddadi, F., Khanchi, S., Shetabi, M., Derhami, V.: Intrusion detection and attack classification using feed-forward neural network. In: 2010 Second International Conference on Computer and Network Technology, pp. 262–266, April 2010

    Google Scholar 

  10. Gong, W., Fu, W., Cai, L.: A neural network based intrusion detection data fusion model. In: 2010 Third International Joint Conference on Computational Science and Optimization, vol. 2, pp. 410–414, May 2010

    Google Scholar 

  11. Mukhopadhyay, I., Chakraborty, M., Chakrabarti, S., Chatterjee, T.: Back propagation neural network approach to intrusion detection system. In: 2011 International Conference on Recent Trends in Information Systems, pp. 303–308, December 2011

    Google Scholar 

  12. Sonawane, H.A., Pattewar, T.A.: A comparative performance evaluation of intrusion detection based on neural network and PCA. In: 2015 International Conference on Communications and Signal Processing (ICCSP), pp. 0841–0845, April 2015

    Google Scholar 

  13. Pattewar, T.M., Sonawane, H.A.: Neural network based intrusion detection using Bayesian with PCA and KPCA feature extraction. In: 2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS), pp. 83–88, November 2015

    Google Scholar 

  14. Van, N.T.T., Thinh, T.N.: Accelerating anomaly-based IDS using neural network on GPU. In: 2015 International Conference on Advanced Computing and Applications (ACOMP), pp. 67–74, November 2015

    Google Scholar 

  15. Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: 2016 Twenty Second National Conference on Communication (NCC), pp. 1–6, March 2016

    Google Scholar 

  16. Potluri, S., Diedrich, C.: Accelerated deep neural networks for enhanced intrusion detection system. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1–8, September 2016

    Google Scholar 

  17. Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook, 2nd edn. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-09823-4

    Book  MATH  Google Scholar 

  18. Nunes, I., et al.: Artificial Neural Networks A Practical Course. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-43162-8

    Book  Google Scholar 

  19. Bassis, S., Esposito, A., Morabito, F.C., Pasero, E.: Advances in Neural Networks. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-18164-6

    Book  Google Scholar 

  20. Charu, C.A.: Neural Networks and Deep Learning a Textbook (2018)

    Google Scholar 

  21. Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). Software: tensorflow.org

  22. Chollet, F., et al.: Keras (2015). https://github.com/fchollet/keras

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek Pawlicki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pawlicki, M., Kozik, R., Choraś, M. (2019). Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection. In: Huang, DS., Bevilacqua, V., Premaratne, P. (eds) Intelligent Computing Theories and Application. ICIC 2019. Lecture Notes in Computer Science(), vol 11643. Springer, Cham. https://doi.org/10.1007/978-3-030-26763-6_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26763-6_72

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26762-9

  • Online ISBN: 978-3-030-26763-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics