{"title":"Neural network & genetic algorithm based approach to network intrusion detection & comparative analysis of performance","authors":"B. Pal, M. Hasan","doi":"10.1109/ICCITECHN.2012.6509809","DOIUrl":null,"url":null,"abstract":"In this paper backpropagation learning algorithm and genetic algorithm is applied for network intrusion detection and also to classify the detected attacks into proper types. During the training process of the backpropagation algorithm two possible set of features in the rule sets are used separately to determine proper rule set features for better performance. Then the performance of genetic algorithm is compared to the performance of both of the backpropagation approach. The process is tested on training dataset as well as test dataset to analyze the performance. It is found that in detecting the attack connections backpropagation algorithm shows better performance but in classifying the detected attacks into proper types the genetic algorithm approach is more successful.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 15th International Conference on Computer and Information Technology (ICCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCITECHN.2012.6509809","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
In this paper backpropagation learning algorithm and genetic algorithm is applied for network intrusion detection and also to classify the detected attacks into proper types. During the training process of the backpropagation algorithm two possible set of features in the rule sets are used separately to determine proper rule set features for better performance. Then the performance of genetic algorithm is compared to the performance of both of the backpropagation approach. The process is tested on training dataset as well as test dataset to analyze the performance. It is found that in detecting the attack connections backpropagation algorithm shows better performance but in classifying the detected attacks into proper types the genetic algorithm approach is more successful.