Fariba Haddadi, Sara Khanchi, Mehran Shetabi, V. Derhami
{"title":"基于前馈神经网络的入侵检测与攻击分类","authors":"Fariba Haddadi, Sara Khanchi, Mehran Shetabi, V. Derhami","doi":"10.1109/ICCNT.2010.28","DOIUrl":null,"url":null,"abstract":"Fast Internet growth and increase in number of users make network security essential in recent decades. Lately one of the most hot research topics in network security is intrusion detection systems (IDSs) which try to keep security at the highest level. This paper addresses a IDS using a 2-layered feed-forward neural network. In training phase, “early stopping” strategy is used to overcome the “over-fitting” problem in neural networks. The proposed system is evaluated by DARPA dataset. The connections selected from DARPA is preprocessed and feature range is converted into [-1, 1]. These modifications affect final detection results notably. Experimental results show that the system, with simplicity in comparison with similar cases, has suitable performance with high precision.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"66","resultStr":"{\"title\":\"Intrusion Detection and Attack Classification Using Feed-Forward Neural Network\",\"authors\":\"Fariba Haddadi, Sara Khanchi, Mehran Shetabi, V. Derhami\",\"doi\":\"10.1109/ICCNT.2010.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fast Internet growth and increase in number of users make network security essential in recent decades. Lately one of the most hot research topics in network security is intrusion detection systems (IDSs) which try to keep security at the highest level. This paper addresses a IDS using a 2-layered feed-forward neural network. In training phase, “early stopping” strategy is used to overcome the “over-fitting” problem in neural networks. The proposed system is evaluated by DARPA dataset. The connections selected from DARPA is preprocessed and feature range is converted into [-1, 1]. These modifications affect final detection results notably. Experimental results show that the system, with simplicity in comparison with similar cases, has suitable performance with high precision.\",\"PeriodicalId\":135847,\"journal\":{\"name\":\"2010 Second International Conference on Computer and Network Technology\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"66\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Computer and Network Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCNT.2010.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Computer and Network Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCNT.2010.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Detection and Attack Classification Using Feed-Forward Neural Network
Fast Internet growth and increase in number of users make network security essential in recent decades. Lately one of the most hot research topics in network security is intrusion detection systems (IDSs) which try to keep security at the highest level. This paper addresses a IDS using a 2-layered feed-forward neural network. In training phase, “early stopping” strategy is used to overcome the “over-fitting” problem in neural networks. The proposed system is evaluated by DARPA dataset. The connections selected from DARPA is preprocessed and feature range is converted into [-1, 1]. These modifications affect final detection results notably. Experimental results show that the system, with simplicity in comparison with similar cases, has suitable performance with high precision.