Skip to main content

Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5899))

Abstract

Intrusion detection is a critical component of secure information systems. Current intrusion detection systems (IDS) especially NIDS (Network Intrusion Detection System) examine all data features to detect intrusions. However, some of the features may be redundant or contribute little to the detection process and therefore they have an unnecessary negative impact on the system performance. This paper proposes a lightweight intrusion detection model that is computationally efficient and effective based on feature selection and back-propagation neural network (BPNN). Firstly, the issue of identifying important input features based on independent component analysis (ICA) is addressed, because elimination of the insignificant and/or useless inputs leads to a simplification of the problem, therefore results in faster and more accurate detection. Secondly, classic BPNN is used to learn and detect intrusions using the selected important features. Experimental results on the well-known KDD Cup 1999 dataset demonstrate the proposed model is effective and can further improve the performance by reducing the computational cost without obvious deterioration of detection performances.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Roesch, M.: Snort - Lightweight Intrusion Detection for Networks. In: Proc. of the 13th Systems Administration Conference - LISA 1999 (1999)

    Google Scholar 

  2. Kruege, C., Valeur, F.: Stateful Intrusion Detection for High-Speed Networks. In: Proc. of the IEEE Symposium on Research on Security and Privacy, pp. 285–293 (2002)

    Google Scholar 

  3. Hecht-Nielsen, R.: Theory of the backpropagation neural network. In: Proc. of the International Joint Conference on Neural Networks, pp. 593–605 (1989)

    Google Scholar 

  4. Dagupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 28–291 (2002)

    Google Scholar 

  5. Brutlag, J.D.: Aberrant behavior detection in time series for network service monitoring. In: Proceeding of the 14th Systems Administration Conference, pp. 139–146 (2000)

    Google Scholar 

  6. Hyvaerinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley, New York (2001)

    Book  Google Scholar 

  7. Prasad, M., Sowmya, A., Koch, I.: Efficient Feature Selection based on Independent Component Analysis. In: Proc. of the Intelligent Sensors, Sensor Networks and Information Processing Conference, pp. 427–432 (2004)

    Google Scholar 

  8. Sakaguchi, Y., Ozawa, S., Kotani, M.: Feature Extraction Using Supervised Independent Component Analysis by Maximizing Class Distance. IEEJ Transactions on Electronics, Information and Systems 124-C (2004)

    Google Scholar 

  9. Knowledge discovery in databases DARPA archive. Task Description, http://www.kdd.ics.uci.edu/databases/kddcup99/task.htm

  10. Introduction to Backpropagation Neural Networks, http://cortex.snowcron.com/neural_networks.htm

  11. Li, Y., Fang, B.-X., Guo, L., Chen, Y.: A Lightweight Intrusion Detection Model Based on Feature Selection and Maximum Entropy Model. In: Proc. of 2006 International Conference on Communication Technology (ICCT 2006), pp. 1–4 (2006)

    Google Scholar 

  12. Chen, Y., Dai, L., Li, Y., Cheng, X.-Q.: Building Lightweight Intrusion Detection System Based on Principal Component Analysis and C4.5 Algorithm. In: Proc. of the 9th International Conference on Advanced Communication Technology (ICACT 2007), pp. 2109–2112 (2007)

    Google Scholar 

  13. Chen, Y., Li, Y., Cheng, X., Guo, L.: Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 153–167. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sun, NQ., Li, Y. (2009). Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism. In: Lee, Yh., Kim, Th., Fang, Wc., Ślęzak, D. (eds) Future Generation Information Technology. FGIT 2009. Lecture Notes in Computer Science, vol 5899. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10509-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10509-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10508-1

  • Online ISBN: 978-3-642-10509-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics