人工神经网络分析了KDD cup 99数据集的入侵检测

Samuel Olorunfemi Adams, Ednah Azikwe, Mohammed Anono Zubair
{"title":"人工神经网络分析了KDD cup 99数据集的入侵检测","authors":"Samuel Olorunfemi Adams, Ednah Azikwe, Mohammed Anono Zubair","doi":"10.26480/aim.02.2022.55.61","DOIUrl":null,"url":null,"abstract":"Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with 99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION\",\"authors\":\"Samuel Olorunfemi Adams, Ednah Azikwe, Mohammed Anono Zubair\",\"doi\":\"10.26480/aim.02.2022.55.61\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with 99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study.\",\"PeriodicalId\":53122,\"journal\":{\"name\":\"Acta Informatica Malaysia\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Acta Informatica Malaysia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.26480/aim.02.2022.55.61\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Acta Informatica Malaysia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26480/aim.02.2022.55.61","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由于对本地网络和互联网的入侵越来越多,它已经变得如此普遍,以至于机构越来越多地实施了许多调查信息技术安全违规的结构。本研究旨在利用人工神经网络(ANN)技术对一些选定的网络攻击进行处理、分类和预测入侵检测的准确性。五项重要攻击,即;从KDD CUPP ' 99信息中选择了缓冲区溢出、拒绝服务攻击(DoS)、用户对根攻击(U2R)、远程对本地攻击(R2L)和探针攻击,并利用人工神经网络(ANN)建模技术对入侵识别的准确性进行了研究。分类结果表明,在用于建立ANN模型的程序中,45528缓冲区溢出有27262个被分类正确,45528 DoS攻击有7903个被分类正确,45528 U2R有1371个被分类正确,45528 R2L有431个被分类正确,45528 PROBE有8304个被分类正确。综合来看,约99.1%的训练过程安排得当,相当于0.9%的错误分类,而辅助确认模型的测试样本中,99.1%的攻击被ANN方程安排得当。这表明,总的来说,人工神经网络方程对于本研究中调查的五种攻击的分类和预测是精确的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION
Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with 99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
12 weeks
期刊最新文献
A DEEP LEARNING MODEL FOR FACE RECOGNITION IN PRESENCE OF MASK ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION ENHANCING THE SECURITY OF AN ORGANIZATION FROM SHADOW IOT DEVICES USING BLOW-FISH ENCRYPTION STANDARD STATUS AND PROSPECTS OF ICT AMONG NEPALESE SMALLHOLDER FARMERS ACONVERGENCE OF MACHINE LEARNING AND STATISTICS TO PREDICT COVID-19 EVOLUTION
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1