Skip to main content
Top

2019 | OriginalPaper | Chapter

Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer

Author : K. Rithesh

Published in: Emerging Research in Electronics, Computer Science and Technology

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Anomaly detection in network traffic is one of the major concerns for the researches and the network administrators. Presence of anomalies in network traffic could indicate a possible intrusion on the network, increasing the need for a fast and reliable network intrusion detection system (NIDS). A novel method of using an artificial neural network (ANN) optimised with Cuckoo Search Optimizer (CSO) is developed in this research paper to act as network monitoring and anomaly detection system. Two subsets of the KDD Cup 99 dataset have been considered to train and test our model, one of 2000 instances and the other of 10,000 instances, along with the complete dataset of 61,593 instances and I have compared the result with the BCS-GA algorithm and the fuzzy K-means clustering algorithm optimised with PSO in terms of precision, recall and f1-score, and the training time for the model with the selected database instances.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yang H, Xie F Lu Y (2006) Research on network anomaly detection based on clustering and classifier. In: 2006 International conference on computational intelligence and security, Guangzhou, pp 592–597 Yang H, Xie F Lu Y (2006) Research on network anomaly detection based on clustering and classifier. In: 2006 International conference on computational intelligence and security, Guangzhou, pp 592–597
2.
go back to reference Common Types of Network Attacks—Microsoft Docs Common Types of Network Attacks—Microsoft Docs
3.
go back to reference Holm H (2014) Signature based intrusion detection for zero-day attacks. In: 2014 47th Hawaii international conference on system sciences, Waikoloa, HI, pp 4895–4904 Holm H (2014) Signature based intrusion detection for zero-day attacks. In: 2014 47th Hawaii international conference on system sciences, Waikoloa, HI, pp 4895–4904
4.
go back to reference Zhang W, Yang Q, Geng Y (2009) A survey of anomaly detection methods in networks. In: 2009 International symposium on computer network and multimedia technology, Wuhan, pp 1–3 Zhang W, Yang Q, Geng Y (2009) A survey of anomaly detection methods in networks. In: 2009 International symposium on computer network and multimedia technology, Wuhan, pp 1–3
5.
go back to reference Almansob SM Lomte SS (2017) Addressing challenges for intrusion detection system using naive Bayes and PCA algorithm. In: 2017 2nd international conference for convergence in technology (I2CT), Mumbai, pp 565–568 Almansob SM Lomte SS (2017) Addressing challenges for intrusion detection system using naive Bayes and PCA algorithm. In: 2017 2nd international conference for convergence in technology (I2CT), Mumbai, pp 565–568
6.
go back to reference Mabu S, Chen C, Lu N, Shimada K Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern Part C (Appl Rev) 41(1):130–139 Mabu S, Chen C, Lu N, Shimada K Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern Part C (Appl Rev) 41(1):130–139
7.
go back to reference Kevric J, Jukic S, Subasi A (2016) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 1–8 Kevric J, Jukic S, Subasi A (2016) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 1–8
9.
go back to reference Thakong M, Wongthanavasu S (2007) Packet header anomaly detection using bayesian belief network. ECTI Trans Comput Inf Technol 3(1) Thakong M, Wongthanavasu S (2007) Packet header anomaly detection using bayesian belief network. ECTI Trans Comput Inf Technol 3(1)
10.
go back to reference Li W, Duan M, Chen Y (2008) Network anomaly detection based on MRMHC-SVM algorithm. In: 2008 IEEE international multitopic conference, Karachi, pp 307–312 Li W, Duan M, Chen Y (2008) Network anomaly detection based on MRMHC-SVM algorithm. In: 2008 IEEE international multitopic conference, Karachi, pp 307–312
11.
go back to reference Al-Janabi STF, Saeed HA (2011) A neural network based anomaly intrusion detection system. In: 2011 Developments in e-systems engineering, Dubai, pp 221–226 Al-Janabi STF, Saeed HA (2011) A neural network based anomaly intrusion detection system. In: 2011 Developments in e-systems engineering, Dubai, pp 221–226
12.
go back to reference Su M-Y (2011) Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):3492–3498CrossRef Su M-Y (2011) Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):3492–3498CrossRef
13.
go back to reference Singh S, Silakari S (2009) An ensemble approach for feature selection of cyber attack dataset. Int J Comput Sci Inf Secur P12-(IJCSIS) 6(2) Singh S, Silakari S (2009) An ensemble approach for feature selection of cyber attack dataset. Int J Comput Sci Inf Secur P12-(IJCSIS) 6(2)
14.
go back to reference Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132 Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132
15.
go back to reference Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst
16.
go back to reference Li H (2010) Research and implementation of an anomaly detection model based on clustering analysis. In: 2010 International symposium on intelligence information processing and trusted computing, Huanggang, pp 458–462 Li H (2010) Research and implementation of an anomaly detection model based on clustering analysis. In: 2010 International symposium on intelligence information processing and trusted computing, Huanggang, pp 458–462
17.
go back to reference Leon E, Nasraoui O Gomez J (2004) Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. In: Proceedings of the 2004 congress on evolutionary computation (IEEE Cat. No. 04TH8753), vol 1, pp 502–508 Leon E, Nasraoui O Gomez J (2004) Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. In: Proceedings of the 2004 congress on evolutionary computation (IEEE Cat. No. 04TH8753), vol 1, pp 502–508
18.
go back to reference Jidiga GR, Sammulal P (2014) Anomaly detection using machine learning with a case study. In: 2014 IEEE international conference on advanced communications, control and computing technologies, Ramanathapuram, pp 1060–1065 Jidiga GR, Sammulal P (2014) Anomaly detection using machine learning with a case study. In: 2014 IEEE international conference on advanced communications, control and computing technologies, Ramanathapuram, pp 1060–1065
19.
go back to reference Callegari C, Giordano S, Pagano M (2014) Neural network based anomaly detection. In: 2014 IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CAMAD), Athens, pp 310–314 Callegari C, Giordano S, Pagano M (2014) Neural network based anomaly detection. In: 2014 IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CAMAD), Athens, pp 310–314
20.
go back to reference Han S-J, Cho S-B (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern Part B (Cybernetics) 36(3):559–570MathSciNetCrossRef Han S-J, Cho S-B (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern Part B (Cybernetics) 36(3):559–570MathSciNetCrossRef
21.
go back to reference Andropov S, Guirik A, Budko M, Budko M (2017) Network anomaly detection using artificial neural networks. In: 2017 20th conference of open innovations association (FRUCT), St. Petersburg Andropov S, Guirik A, Budko M, Budko M (2017) Network anomaly detection using artificial neural networks. In: 2017 20th conference of open innovations association (FRUCT), St. Petersburg
22.
go back to reference Naik M, Nath MR, Wunnava A, Sahany S, Panda R (2015) A new adaptive Cuckoo search algorithm. In: 2015 IEEE 2nd international conference on recent trends in information systems (ReTIS), Kolkata, pp 1–5 Naik M, Nath MR, Wunnava A, Sahany S, Panda R (2015) A new adaptive Cuckoo search algorithm. In: 2015 IEEE 2nd international conference on recent trends in information systems (ReTIS), Kolkata, pp 1–5
23.
go back to reference Majumdar D, Mallick S (2016) Cuckoo search algorithm for constraint satisfaction and optimization. In: 2016 Second international conference on research in computational intelligence and communication networks (ICRCICN), Kolkata, pp 235–240 Majumdar D, Mallick S (2016) Cuckoo search algorithm for constraint satisfaction and optimization. In: 2016 Second international conference on research in computational intelligence and communication networks (ICRCICN), Kolkata, pp 235–240
24.
go back to reference Zhao P, Li H (2012) Opposition-based Cuckoo search algorithm for optimization problems. In: 2012 Fifth international symposium on computational intelligence and design, Hangzhou, pp 344–347 Zhao P, Li H (2012) Opposition-based Cuckoo search algorithm for optimization problems. In: 2012 Fifth international symposium on computational intelligence and design, Hangzhou, pp 344–347
25.
go back to reference Yang XS, Deb S (2009) Cuckoo search via Lévy flights. In: 2009 World congress on nature and biologically inspired computing (NaBIC), Coimbatore, pp 210–214 Yang XS, Deb S (2009) Cuckoo search via Lévy flights. In: 2009 World congress on nature and biologically inspired computing (NaBIC), Coimbatore, pp 210–214
26.
go back to reference Hamamoto AH, Carvalho LF, Sampaio LDH, Abrão T, Proença ML (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390–402 Hamamoto AH, Carvalho LF, Sampaio LDH, Abrão T, Proença ML (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390–402
27.
go back to reference Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF (2018) A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6:20255–20261 Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF (2018) A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6:20255–20261
28.
go back to reference Koehrsen W (2018) Beyond accuracy: precision and recall—towards data science Koehrsen W (2018) Beyond accuracy: precision and recall—towards data science
29.
go back to reference Ghosh P, Jha S, Dutta R, Phadikar S (2018) Intrusion detection system based on BCS-GA in cloud environment. In: Shetty N, Patnaik L, Prasad N, Nalini N (eds) Emerging research in computing, information, communication and applications. ERCICA 2016. Springer, Singapore Ghosh P, Jha S, Dutta R, Phadikar S (2018) Intrusion detection system based on BCS-GA in cloud environment. In: Shetty N, Patnaik L, Prasad N, Nalini N (eds) Emerging research in computing, information, communication and applications. ERCICA 2016. Springer, Singapore
30.
go back to reference Ensafi R, Dehghanzadeh S, Akbarzadeh TMR (2008) Optimizing fuzzy k-means for network anomaly detection using PSO. In: 2008 IEEE/ACS international conference on computer systems and applications, Doha, pp 686–693 Ensafi R, Dehghanzadeh S, Akbarzadeh TMR (2008) Optimizing fuzzy k-means for network anomaly detection using PSO. In: 2008 IEEE/ACS international conference on computer systems and applications, Doha, pp 686–693
Metadata
Title
Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer
Author
K. Rithesh
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-5802-9_3