skip to main content
10.1145/3456415.3456431acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbnConference Proceedingsconference-collections
research-article

A novel DBN-LSSVM ensemble method for intrusion detection system

Authors Info & Claims
Published:06 June 2021Publication History

ABSTRACT

In recent years, neural networks have been used to process network security data in intrusion detection, a process that is often highly nonlinear and strongly correlated. To address the problem that existing methods have high detection rates for known attack types, but have shortcomings in identifying emerging attack types, an intrusion detection (DBN-LSSVM) method combining a deep belief network (DBN) and a least-squares vector machine (LSSVM) is proposed. First, the original network dataset is pre-processed and the DBN is used to downscale the features of the dataset; then the PSO algorithm is used to optimize the input weights and implicit layer biases of LSSVM to establish an intrusion detection model; finally, simulation experiments are conducted on the KDD CUP 99 dataset. The experimental results show that compared with DBN-MSVM, DBN-BP, and SVM methods, the overall detection accuracy is significantly improved, and DBN-LSSVM has higher detection efficiency and better intrusion detection classification performance.

References

  1. Denning D E. An intrusion-detection model. IEEE Transactions on software engineering, 1987 (2), 222-232. https://doi.org/10.1109/TSE.1987.232894Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Lee W, Stolfo S J, Mok K W. Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review, 2000, 14(6), 533-567. https://doi.org/10.1023/A:1006624031083Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Anderson J P. Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, 1980.Google ScholarGoogle Scholar
  4. Singh J, Nene M J. A survey on machine learning techniques for intrusion detection systems. International Journal of Advanced Research in Computer and Communication Engineering, 2013, 2(11), 4349-4355.Google ScholarGoogle Scholar
  5. Hinton G E, Osindero S, Teh Y W. A fast learning algorithm for deep belief nets. Neural computation, 2006, 18(7), 1527-1554. https://doi.org/10.1162/neco.2006.18.7.1527Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Nair V, Hinton GE. Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th international conference on international conference on machine learning. Haifa, Israel: Omnipress, 2010, 807–814. https://icml.cc/Conferences/2010/papers/432.pdfGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  7. Arsa D M S, Jati G, Mantau A J, Dimensionality reduction using deep belief network in big data case study: Hyperspectral image classification. 2016 International Workshop on Big Data and Information Security, IEEE, 2016, 71-76. https://doi.org/10.1109/IWBIS.2016.7872892Google ScholarGoogle ScholarCross RefCross Ref
  8. Yan Yan,Xu-Cheng Yin,Sujian Li,Mingyuan Yang,Hong-Wei Hao,Pasi A. Karjalainen. Learning Document Semantic Representation with Hybrid Deep Belief Network. Computational Intelligence and Neuroscience, 2015, 1-9. https://doi.org/10.1155/2015/650527Google ScholarGoogle Scholar
  9. Gao N, Gao L, Gao Q, An intrusion detection model based on deep belief networks. 2014 Second International Conference on Advanced Cloud and Big Data. IEEE, 2014, 247-252. https://doi.org/10.1109/CBD.2014.41Google ScholarGoogle ScholarCross RefCross Ref
  10. Nagaraj Balakrishnan, Arunkumar Rajendran, Danilo Pelusi,Vijayakumar Ponnusamy. Deep Belief Network enhanced Intrusion Detection System to Prevent Security Breach in the Internet of Things. Internet of Things, 2019. https://doi.org/10.1016/j.iot.2019.100112Google ScholarGoogle ScholarCross RefCross Ref
  11. Suykens J A K, Vandewalle J. Least squares support vector machine classifiers. Neural processing letters, 1999, 9(3), 293-300. https://doi.org/10.1023/A:1018628609742Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Tavallaee M, Bagheri E, Lu W, A detailed analysis of the KDD CUP 99 data set. 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, 2009, 1-6. https://doi.org/10.1109/CISDA.2009.5356528Google ScholarGoogle ScholarCross RefCross Ref
  13. Gao N, He Y Y, Gao L. Deep learning method for intrusion detection in massive data. Applications Research of Computers, 2018, 35(4), 1197-1200.Google ScholarGoogle Scholar
  14. Cilimkovic M. Neural networks and back propagation algorithm. Institute of Technology Blanchardstown, Blanchardstown Road North Dublin, 2015, 15.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCBN '21: Proceedings of the 2021 9th International Conference on Communications and Broadband Networking
    February 2021
    342 pages
    ISBN:9781450389174
    DOI:10.1145/3456415

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 6 June 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format