Abstract
Intrusion detection is a critical component of secure information systems. Current intrusion detection systems (IDS) especially NIDS (Network Intrusion Detection System) examine all data features to detect intrusions. However, some of the features may be redundant or contribute little to the detection process and therefore they have an unnecessary negative impact on the system performance. This paper proposes a lightweight intrusion detection model that is computationally efficient and effective based on feature selection and back-propagation neural network (BPNN). Firstly, the issue of identifying important input features based on independent component analysis (ICA) is addressed, because elimination of the insignificant and/or useless inputs leads to a simplification of the problem, therefore results in faster and more accurate detection. Secondly, classic BPNN is used to learn and detect intrusions using the selected important features. Experimental results on the well-known KDD Cup 1999 dataset demonstrate the proposed model is effective and can further improve the performance by reducing the computational cost without obvious deterioration of detection performances.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Roesch, M.: Snort - Lightweight Intrusion Detection for Networks. In: Proc. of the 13th Systems Administration Conference - LISA 1999 (1999)
Kruege, C., Valeur, F.: Stateful Intrusion Detection for High-Speed Networks. In: Proc. of the IEEE Symposium on Research on Security and Privacy, pp. 285–293 (2002)
Hecht-Nielsen, R.: Theory of the backpropagation neural network. In: Proc. of the International Joint Conference on Neural Networks, pp. 593–605 (1989)
Dagupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 28–291 (2002)
Brutlag, J.D.: Aberrant behavior detection in time series for network service monitoring. In: Proceeding of the 14th Systems Administration Conference, pp. 139–146 (2000)
Hyvaerinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley, New York (2001)
Prasad, M., Sowmya, A., Koch, I.: Efficient Feature Selection based on Independent Component Analysis. In: Proc. of the Intelligent Sensors, Sensor Networks and Information Processing Conference, pp. 427–432 (2004)
Sakaguchi, Y., Ozawa, S., Kotani, M.: Feature Extraction Using Supervised Independent Component Analysis by Maximizing Class Distance. IEEJ Transactions on Electronics, Information and Systems 124-C (2004)
Knowledge discovery in databases DARPA archive. Task Description, http://www.kdd.ics.uci.edu/databases/kddcup99/task.htm
Introduction to Backpropagation Neural Networks, http://cortex.snowcron.com/neural_networks.htm
Li, Y., Fang, B.-X., Guo, L., Chen, Y.: A Lightweight Intrusion Detection Model Based on Feature Selection and Maximum Entropy Model. In: Proc. of 2006 International Conference on Communication Technology (ICCT 2006), pp. 1–4 (2006)
Chen, Y., Dai, L., Li, Y., Cheng, X.-Q.: Building Lightweight Intrusion Detection System Based on Principal Component Analysis and C4.5 Algorithm. In: Proc. of the 9th International Conference on Advanced Communication Technology (ICACT 2007), pp. 2109–2112 (2007)
Chen, Y., Li, Y., Cheng, X., Guo, L.: Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 153–167. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sun, NQ., Li, Y. (2009). Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism. In: Lee, Yh., Kim, Th., Fang, Wc., Ślęzak, D. (eds) Future Generation Information Technology. FGIT 2009. Lecture Notes in Computer Science, vol 5899. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10509-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-10509-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10508-1
Online ISBN: 978-3-642-10509-8
eBook Packages: Computer ScienceComputer Science (R0)