Skip to main content

A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection

  • Conference paper
  • First Online:
Book cover Mathematics and Computing (ICMC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 655))

Included in the following conference series:

Abstract

Security of data is considered to be one of the most important concerns in today’s world. Data is vulnerable to various types of intrusion attacks that may reduce the utility of any network or systems. Constantly changing and the complicated nature of intrusion activities on computer networks cannot be dealt with IDSs that are currently operational. Identifying and preventing such attacks is one of the most challenging tasks. Deep Learning is one of the most effective machine learning techniques which is getting popular recently. This paper checks the potential capability of Deep Neural Network as a classifier for the different types of intrusion attacks. A comparative study has also been carried out with Support Vector Machine (SVM). The experimental results show that the accuracy of intrusion detection using Deep Neural Network is satisfactory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA 2001) (2001)

    Google Scholar 

  2. Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, vol. 2, pp. 1702–1707. IEEE (2002)

    Google Scholar 

  3. Ouyang, W., Wang, X.: Joint deep learning for pedestrian detection. In: 2013 IEEE International Conference on Computer Vision (ICCV), pp. 2056–2063. IEEE, December 2013

    Google Scholar 

  4. Roy, S.S., Mittal, D., Basu, A., Abraham, A.: Stock market forecasting using LASSO linear regression model. In: Abraham, A., Krömer, P., Snasel, V. (eds.) Afro-European Conference for Industrial Advancement. AISC, vol. 334, pp. 371–381. Springer, Cham (2015). doi:10.1007/978-3-319-13572-4_31

    Google Scholar 

  5. Basu, A., Roy, S.S., Abraham, A.: A novel diagnostic approach based on support vector machine with linear kernel for classifying the Erythemato-Squamous disease. In: 2015 International Conference on Computing, Communication Control and Automation (ICCUBEA), pp. 343–347. IEEE, February 2015

    Google Scholar 

  6. Arel, I., Rose, D., Coop, R.: DeSTIN: a scalable deep learning architecture with application to high-dimensional robust pattern recognition. In: AAAI Fall Symposium: Biologically Inspired Cognitive Architectures, November 2009

    Google Scholar 

  7. Roy, S.S., Viswanatham, V.M., Krishna, P.V., Saraf, N., Gupta, A., Mishra, R.: Applicability of rough set technique for data investigation and optimization of intrusion detection system. In: Singh, K., Awasthi, A.K. (eds.) QSHINE 2013. LNICST, vol. 115, pp. 479–484. Springer, Heidelberg (2013). doi:10.1007/978-3-642-37949-9_42

    Chapter  Google Scholar 

  8. Wang, S., Jiang, Y., Chung, F.L., Qian, P.: Feedforward kernel neural networks, generalized least learning machine, and its deep learning with application to image classification. Appl. Soft Comput. 37, 125–141 (2015)

    Article  Google Scholar 

  9. Wackerly, D., Mendenhall, W., Scheaffer, R.: Mathematical Statistics with Applications. Cengage Learning (2007)

    Google Scholar 

  10. Draper, N.R., Smith, H., Pownell, E.: Applied Regression Analysis, vol. 3. Wiley, New York (1966)

    Google Scholar 

  11. Deng, L.: Three classes of deep learning architectures and their applications: a tutorial survey. APSIPA Trans. Sig. Inf. Process. (2012)

    Google Scholar 

  12. Roy, S.S., Viswanatham, V.M.: Classifying spam emails using artificial intelligent techniques. Int. J. Eng. Res. Africa 22, 152–161 (2016)

    Article  Google Scholar 

  13. Roy, S.S., Viswanatham, V.M., Krishna, P.V.: Spam detection using hybrid model of rough set and decorate ensemble. Int. J. Comput. Syst. Eng. 2(3), 139–147 (2016)

    Article  Google Scholar 

  14. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)

    MATH  Google Scholar 

  15. Mittal, D., Gaurav, D., Roy, S.S.: An effective hybridized classifier for breast cancer diagnosis. In: 2015 IEEE International Conference on Advanced Intelligent Mechatronics (AIM), pp. 1026–1031. IEEE, July 2015

    Google Scholar 

  16. Bengio, Y.: Learning deep architectures for AI. Found. Trends® Mach. Learn. 2(1), 1–127 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  17. Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527–1554 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  18. Hansen, L.K., Salamon, P.: Neural network ensembles. IEEE Trans. Patt. Anal. Mach. Intell. 12, 993–1001 (1990)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjiban Sekhar Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Roy, S.S., Mallik, A., Gulati, R., Obaidat, M.S., Krishna, P.V. (2017). A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection. In: Giri, D., Mohapatra, R., Begehr, H., Obaidat, M. (eds) Mathematics and Computing. ICMC 2017. Communications in Computer and Information Science, vol 655. Springer, Singapore. https://doi.org/10.1007/978-981-10-4642-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4642-1_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4641-4

  • Online ISBN: 978-981-10-4642-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics