Abstract
Cyber threats are diversified in both volume and variety as most of the organizations develop and accept emerging technologies related to big data, cloud computing, and Internet of Things. In the area of cyber security, intrusion detection system (IDS) plays a significant role to identify the existing attack from network traffic. Over the past few decades, a lot of research works have been performed in this area. Researchers have used DARPA, KDD98, KDD99, and NSL-KDD datasets as a benchmark for their experiments. However, in the current network scenario, these datasets do not intuitively reflect proper network traffic and modern low footprint attacks. In this regard, this paper proposes a novel intrusion detection technique, where principal component analysis (PCA) has been used for dimensionality reduction, and multilayer perceptron (MLP) has been applied for classification. All the experiments have been conducted over the current UNSW-NB15 dataset consisting of a total of 2540,044 records with 9 different types of modern low footprint attacks. The experimental results demonstrate that the proposed misuse-based technique achieved a higher detection rate and low false alarm rate in comparison with other existing methods in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aburomman, A.A., Reaz, M.B.I.: Survey of learning methods in intrusion detection systems. In: 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES), pp. 362–365. IEEE (2016)
Amato, F., Cozzolino, G., Mazzeo, A., Vivenzio, E.: Using multilayer perceptron in computer security to improve intrusion detection. In: International Conference on Intelligent Interactive Multimedia Systems and Services, pp. 210–219. Springer (2018)
Belouch, M., El Hadaj, S., Idhammad, M.: A two-stage classifier approach using reptree algorithm for network intrusion detection. Int. J. Adv. Comput. Sci. Appl. 8(6), 389–394 (2017)
Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2015)
Cannady, J.: Artificial neural networks for misuse detection. In: National Information Systems Security Conference, vol. 26. Baltimore (1998)
Enache, A.C., Patriciu, V.V.: Intrusions detection based on support vector machine optimized with swarm intelligence. In: 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence And Informatics (SACI), pp. 153–158. IEEE (2014)
Jha, J., Ragha, L.: Intrusion detection system using support vector machine. Int. J. Appl. Inf. Syst. (IJAIS) 3, 25–30 (2013)
Li, W.: Using genetic algorithm for network intrusion detection. In: Proceedings of the United States Department of Energy Cyber Security Group, vol. 1, pp. 1–8 (2004)
Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424–430 (2012)
Li, Z., Qin, Z., Huang, K., Yang, X., Ye, S.: Intrusion detection using convolutional neural networks for representation learning. In: International Conference on Neural Information Processing, pp. 858–866. Springer (2017)
Lippmann, R.P., Cunningham, R.K.: Improving intrusion detection performance using keyword selection and neural networks. Comput. Netw. 34(4), 597–603 (2000)
Markov, Z., Russell, I.: An introduction to the Weka data mining system. In: ACM SIGCSE Bulletin, vol. 38, pp. 367–368. ACM (2006)
Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)
Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf. Secur. J.: A Glob. Perspect. 25(1–3), 18–31 (2016)
Shaveta, E., Bhandari, A., Saluja, K.K.: Applying genetic algorithm in intrusion detection system: a comprehensive review. In: Association of Computer Electronics and Electrical Engineers (2014)
Subba, B., Biswas, S., Karmakar, S.: Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE (2016)
Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., Zhu, M.: Hast-ids: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2017)
Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp. 712–717. IEEE (2017)
Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Chowdhury, R., Roy, A., Saha, B., Bandyopadhyay, S.K. (2023). An Intelligent Intrusion Detection System Using a Novel Combination of PCA and MLP. In: Gyei-Kark, P., Jana, D.K., Panja, P., Abd Wahab, M.H. (eds) Engineering Mathematics and Computing. Studies in Computational Intelligence, vol 1042. Springer, Singapore. https://doi.org/10.1007/978-981-19-2300-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-19-2300-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2299-2
Online ISBN: 978-981-19-2300-5
eBook Packages: EngineeringEngineering (R0)