Icccn 2019 8847179
Icccn 2019 8847179
Intrusion Detection
Nada Aboueata Sara Alrasbi Aiman Erbad
Qatar University Qatar University Qatar University
Doha, Qatar Doha, Qatar Doha, Qatar
na090288@qu.edu.qa sa099464@qu.edu.qa aerbad@qu.edu.qa
equation 7.
2 Z = W (l )X + b (l ) (6)
W [L] = Wr × (5)
N
relu(Z ) = max(0, Z ) (7)
2 is a multiplication factor recommended by He et.al. [10] for
N Here we have used the Rectified Linear Unit (ReLU) function,
better weights initialization. Next step is the forward propagation which is zero when Z < 0 and linear with a slope 1 when Z > 0.
phase. Each training example X from the input layer, goes through Calculations in equation 6 and 7 are repeated at each hidden layer.
transformation at each neuron it visits on each hidden layer. At For the output layer we use siдmoidal function as the activation
each neuron, two steps are performed. First, modified value of in- function, since our aim is to perform the binary classification and
put X after applying the weights W and biases b of a layer l is siдmoidal function is apt for the same [19]
calculated. It is represented by variable Z and is given by equation
6. Second, activation function is applied to generate the output at 1
each hidden layer. A simple ReLU activation function is given by siдmoid(Z ) = (8)
1 + e −Z
in table 6. It can be clearly seen that the general purpose category
m
1 (i) achieved the best accuracy (92% training accuracy and 91% testing
J =− (y log a (i) ) × ((1 − y (i) )(1 − log a (i) )) (9) accuracy) as compared with the other categories.
m i=0
At the end of the forward propagation phase, we compute the cost Table 6: ANN Training and Testing Results per Feature Cat-
to evaluate the model. We have used cross-entropy loss function egory. Best value per column is boldfaced.
[4] which have many practical applications in which, very small
probabilities need to be calculated quickly. It is given by the equa-
Training Results Testing Results
tion 9. In equation 9, m denotes the total number of training sam-
Cat. P R F1 Acc. P R F1 Acc
ples, ai denotes the prediction for training example i, and y is the
All 0.86 0.86 0.86 0.86 0.86 0.86 0.86 0.86
true label of training example i. It is expected that the cost de-
Cont. 0.78 0.74 0.75 0.74 0.78 0.74 0.75 0.74
creases in each iteration. The next step is the backward propaga-
Time 0.88 0.85 0.84 0.85 0.87 0.85 0.84 0.85
tion in which, the weights and the biases are updated based on the
prediction errors calculated in the earlier stage. The weights are Gen. 0.93 0.92 0.92 0.92 0.93 0.92 0.92 0.91
updated using the gradient decent algorithm, which tries to opti- Conn. 0.88 0.88 0.88 0.88 0.87 0.88 0.87 0.88
mize the training parameter so that the errors are minimized. ChiX 2 0.87 0.85 0.84 0.85 0.88 0.87 0.86 0.85
approach compared with the work proposed in [14]. Similar to our 38(5):1062–1072, 2012.
work, authors in [14] have used UNSW-NB-15 dataset for evalua- [8] KDD Cup. Dataset. available at the following website http://kdd. ics. uci.
edu/databases/kddcup99/kddcup99. html, 72, 1999.
tion. The results have shown that the classification accuracy with [9] Jiawei Han, Jian Pei, and Micheline Kamber. Data mining: concepts and tech-
our proposed schemes is improved significantly (from 81% to 92%) niques. Elsevier, 2011.
[10] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into
by selecting the general purpose features only (i.e., five features). rectifiers: Surpassing human-level performance on imagenet classification. In
compared against the accuracy of the work proposed in [14] with Proceedings of the IEEE international conference on computer vision, pages 1026–
20 features. Thus, we can conclude that the main goal of maximiz- 1034, 2015.
[11] Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh,
ing the accuracy of classification while minimizing the features Ephraim Iorkyase, Christos Tachtatzis, and Robert Atkinson. Threat analysis of
dimensionality can be achieved by using the proposed ANN and iot networks using artificial neural network intrusion detection system. In Net-
SVM models while considering the general purpose features for works, Computers and Communications (ISNCC), 2016 International Symposium
on, pages 1–6. IEEE, 2016.
classification. Also, reducing the features dimensionality by the [12] Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian
proposed approach can reduce the training time and complexity Chen, Jui-Lin Lai, and Citra Dwi Perkasa. A novel intrusion detection system
based on hierarchical clustering and support vector machines. Expert Systems
significantly, without compromising the accuracy of anomaly de- with Applications, 38(1):306 – 313, 2011.
tection. [13] Wenjie Hu, Yihua Liao, and V Rao Vemuri. Robust support vector machines for
As a future work, the authors plan to perform the sensitivity anomaly detection in computer security. In ICMLA, pages 168–174, 2003.
[14] Chaouki Khammassi and Saoussen Krichen. A ga-lr wrapper approach for fea-
analysis of the problem, especially by implementing cross valida- ture selection in network intrusion detection. Computers & Security, 2017.
tion technique in the evaluation. Also, the authors aim to train the [15] Fangjun Kuang, Siyang Zhang, Zhong Jin, and Weihong Xu. A novel SVM by
multi-class ML models to predict the exact attack type for finer combining kernel principal component analysis and improved chaotic particle
swarm optimization for intrusion detection. Soft Computing, 19(5):1187–1199,
classification. May 2015.
[16] Yinhui Li, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, and Kuobin Dai.
An efficient intrusion detection system based on support vector machines and
6 ACKNOWLEDGEMENT gradually feature removal method. Expert Systems with Applications, 39(1):424–
This publication was made possible by NPRP award [NPRP 8-634- 430, 2012.
[17] Richard P Lippmann and Robert K Cunningham. Improving intrusion detection
1-131] from the Qatar National Research Fund (a member of The performance using keyword selection and neural networks. Computer Networks,
Qatar Foundation). Also, parts of this work has been funded by 34(4):597–603, 2000.
the Knowledge Foundation, Sweden, through the profile HITS. The [18] Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, and Udaya Tupakula. In-
trusion detection techniques in cloud environment: A survey. Journal of Network
authors would also like to thank Ms. Zeineb Safi and Ms. Reem and Computer Applications, 77(Supplement C):18 – 47, 2017.
Suwaileh for their contributions in the implementation of the al- [19] Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Mut-
tukrishnan Rajarajan. A survey of intrusion detection techniques in cloud. Jour-
gorithms. The statements made herein are solely the responsibility nal of Network and Computer Applications, 36(1):42–57, 2013.
of the author[s]. [20] Mehdi Moradi and Mohammad Zulkernine. A neural network based system for
intrusion detection and classification of attacks. In Proceedings of the IEEE Inter-
national Conference on Advances in Intelligent Systems-Theory and Applications,
REFERENCES pages 15–18, 2004.
[1] Deval Bhamare, Aiman Erbad, Raj Jain, Maede Zolanvari, and Mohammed [21] Nour Moustafa and Jill Slay. Unsw-nb15: a comprehensive data set for network
Samaka. Efficient virtual network function placement strategies for cloud ra- intrusion detection systems (unsw-nb15 network data set). In Military Com-
dio access networks. Computer Communications, 127:50–60, 2018. munications and Information Systems Conference (MilCIS), 2015, pages 1–6. IEEE,
[2] Deval Bhamare, Tara Salman, Mohammed Samaka, Aiman Erbad, and Raj Jain. 2015.
Feasibility of supervised machine learning for cloud security. In Information [22] Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, and Mohammed Samaka.
Science and Security (ICISS), 2016 International Conference on, pages 1–5. IEEE, Machine learning for anomaly detection and categorization in multi-cloud en-
2016. vironments. In Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th
[3] Deval Bhamare, Mohammed Samaka, Aiman Erbad, Raj Jain, Lav Gupta, and International Conference on, pages 97–103. IEEE, 2017.
H Anthony Chan. Multi-objective scheduling of micro-services for optimal ser- [23] Naeem Seliya and Taghi M. Khoshgoftaar. Active learning with neural networks
vice function chains. In 2017 IEEE International Conference on Communications for intrusion detection. pages 49–54, 2010.
(ICC), pages 1–6. IEEE, 2017. [24] Basant Subba, Santosh Biswas, and Sushanta Karmakar. A neural network
[4] Pieter-Tjerk de Boer, Dirk P. Kroese, Shie Mannor, and Reuven Y. Rubinstein. A based system for intrusion detection and attack classification. In Communication
Tutorial on the Cross-Entropy Method. Annals of Operations Research, 134(1):19– (NCC), 2016 Twenty Second National Conference on, pages 1–6. IEEE, 2016.
67, February 2005. [25] Cynthia Wagner, Jérôme François, Thomas Engel, et al. Machine learning ap-
[5] Anna L Buczak and Erhan Guven. A survey of data mining and machine learning proach for ip-flow record anomaly detection. In International Conference on Re-
methods for cyber security intrusion detection. IEEE Communications Surveys search in Networking, pages 28–39. Springer, 2011.
& Tutorials, 18(2):1153–1176, 2016.
[6] James Cannady. Artificial neural networks for misuse detection. In National
information systems security conference, pages 368–81, 1998.
[7] Carlos A Catania and Carlos García Garino. Automatic network intrusion detec-
tion: Current techniques and open issues. Computers & Electrical Engineering,