Skip to main content

An Intelligent Intrusion Detection System Using a Novel Combination of PCA and MLP

  • Chapter
  • First Online:
Engineering Mathematics and Computing

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1042))

  • 563 Accesses

Abstract

Cyber threats are diversified in both volume and variety as most of the organizations develop and accept emerging technologies related to big data, cloud computing, and Internet of Things. In the area of cyber security, intrusion detection system (IDS) plays a significant role to identify the existing attack from network traffic. Over the past few decades, a lot of research works have been performed in this area. Researchers have used DARPA, KDD98, KDD99, and NSL-KDD datasets as a benchmark for their experiments. However, in the current network scenario, these datasets do not intuitively reflect proper network traffic and modern low footprint attacks. In this regard, this paper proposes a novel intrusion detection technique, where principal component analysis (PCA) has been used for dimensionality reduction, and multilayer perceptron (MLP) has been applied for classification. All the experiments have been conducted over the current UNSW-NB15 dataset consisting of a total of 2540,044 records with 9 different types of modern low footprint attacks. The experimental results demonstrate that the proposed misuse-based technique achieved a higher detection rate and low false alarm rate in comparison with other existing methods in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aburomman, A.A., Reaz, M.B.I.: Survey of learning methods in intrusion detection systems. In: 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES), pp. 362–365. IEEE (2016)

    Google Scholar 

  2. Amato, F., Cozzolino, G., Mazzeo, A., Vivenzio, E.: Using multilayer perceptron in computer security to improve intrusion detection. In: International Conference on Intelligent Interactive Multimedia Systems and Services, pp. 210–219. Springer (2018)

    Google Scholar 

  3. Belouch, M., El Hadaj, S., Idhammad, M.: A two-stage classifier approach using reptree algorithm for network intrusion detection. Int. J. Adv. Comput. Sci. Appl. 8(6), 389–394 (2017)

    Google Scholar 

  4. Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2015)

    Article  Google Scholar 

  5. Cannady, J.: Artificial neural networks for misuse detection. In: National Information Systems Security Conference, vol. 26. Baltimore (1998)

    Google Scholar 

  6. Enache, A.C., Patriciu, V.V.: Intrusions detection based on support vector machine optimized with swarm intelligence. In: 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence And Informatics (SACI), pp. 153–158. IEEE (2014)

    Google Scholar 

  7. Jha, J., Ragha, L.: Intrusion detection system using support vector machine. Int. J. Appl. Inf. Syst. (IJAIS) 3, 25–30 (2013)

    Google Scholar 

  8. Li, W.: Using genetic algorithm for network intrusion detection. In: Proceedings of the United States Department of Energy Cyber Security Group, vol. 1, pp. 1–8 (2004)

    Google Scholar 

  9. Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424–430 (2012)

    Article  Google Scholar 

  10. Li, Z., Qin, Z., Huang, K., Yang, X., Ye, S.: Intrusion detection using convolutional neural networks for representation learning. In: International Conference on Neural Information Processing, pp. 858–866. Springer (2017)

    Google Scholar 

  11. Lippmann, R.P., Cunningham, R.K.: Improving intrusion detection performance using keyword selection and neural networks. Comput. Netw. 34(4), 597–603 (2000)

    Article  Google Scholar 

  12. Markov, Z., Russell, I.: An introduction to the Weka data mining system. In: ACM SIGCSE Bulletin, vol. 38, pp. 367–368. ACM (2006)

    Google Scholar 

  13. Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)

    Google Scholar 

  14. Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf. Secur. J.: A Glob. Perspect. 25(1–3), 18–31 (2016)

    Google Scholar 

  15. Shaveta, E., Bhandari, A., Saluja, K.K.: Applying genetic algorithm in intrusion detection system: a comprehensive review. In: Association of Computer Electronics and Electrical Engineers (2014)

    Google Scholar 

  16. Subba, B., Biswas, S., Karmakar, S.: Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE (2016)

    Google Scholar 

  17. Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., Zhu, M.: Hast-ids: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2017)

    Article  Google Scholar 

  18. Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp. 712–717. IEEE (2017)

    Google Scholar 

  19. Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ratul Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chowdhury, R., Roy, A., Saha, B., Bandyopadhyay, S.K. (2023). An Intelligent Intrusion Detection System Using a Novel Combination of PCA and MLP. In: Gyei-Kark, P., Jana, D.K., Panja, P., Abd Wahab, M.H. (eds) Engineering Mathematics and Computing. Studies in Computational Intelligence, vol 1042. Springer, Singapore. https://doi.org/10.1007/978-981-19-2300-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-2300-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-2299-2

  • Online ISBN: 978-981-19-2300-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics